Wednesday, May 29, 2019
Biometric Security Technology Essay -- Technological Computers Essays
Biometric Security TechnologyYou have seen biometric technology in the films Mission Impossible and Gattaca. The technology has also graced the covers of many weekly word magazines. But many people, even though the technology has been widely talked about for the last half decade, are still surprisingly unaware of what biometrics are and why the technology is so important for computer warrantor and personal identification.Biometrics are automated methods of recognizing a person based on a physical or behavioral characteristic (2001). Essentially, biometric security technologies are used to accurately identify individuals on a unique trait. The most common biometric security techniques used shortly are signature verification, face geometry, finger scan, hand geometry, passive iris scan, retina scan, and voice print (2004c).According to The Biometric Consortium, enterprise-wide network security infrastructures, giving medication IDs, secure electronic banking, investing and othe r financial transactions, retail sales, law enforcement, and health and social services are currently benefiting from biometrics (2001). Though biometric technology pull up stakes soon be commonplace on personal home computers and small company computer systems, the high cost of biometric security means that, for the most part, currently only federal, state, and local governments, the military, and large corporations will be able to afford the new technology. That said, however, hardware manufacturers and software developers are currently creating and selling products for the office substance abuser who wants to protect their machines from nosey coworkers (2004a). And Microsoft, developer of the world?s most popular computer operating system, said newer versions ... ...ion.html 23 June 2004.(2002, February 18). About Biometrics. tuition Technology Laboratory. Online. unattached http//www.itl.nist.gov/div893/biometrics/about.html 23 June 2004.Bertolucci, James. (2004a, Ju ne 25). Products for the Paranoid. PC World Online. Available http//www.pcworld.com/news/article/0,aid,116573,00.asp 23 June 2004.Mace, Scott. (2004b, February 24). Gates Previews Security Projects. PC World Online. Available http//www.pcworld.com/news/article/0,aid,114916,00.asp 23 June 24.O?Brien, James A. (2004c). Management Information Systems Managing Information Technology in the Business Enterprise. New York McGraw-Hill.Newell, Adrienne. (2004d, March 19). Are Biometrics Coming to a PC Near You? PC World Online. Available http//www.pcworld.com/news/article/0,aid,115289,00.asp 23 June 2004.
Subscribe to:
Post Comments (Atom)
Witch Dbq free essay sample
The Witch. A word that, these days, conveys alongside it considerations of wonderful schools of enchantment and candy corn for Halloween. Ye...
-
The Witch. A word that, these days, conveys alongside it considerations of wonderful schools of enchantment and candy corn for Halloween. Ye...
-
'From a real preteen pass water on with harmony has been a craze of mine. My nanna leave alone blithely report you that I kn...
-
'Maam, do you regard to raise level move come knocked bulge(p) of the clo hang s on your husband? An laughable spells artic...
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.