country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Fundamental Of Security Technology

tag 0 Download4 Pages / 995 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Describe about history of biometric security, applications of biometric security system, effectiveness of biometric security System and issues of biometric security system.

 

Answer:

History of Biometric Security

In the contemporary era, security technology has been developed in a significant manner, which has ensured the safety as well as privacy of essential data and other important aspects. Moreover, development of security technology also has enhanced the features of cryptography technology, which usually used in case of maintaining information security. In this context, Hassanain, Shaarawy and Hesham (2010) argued that through emphasizing towards cryptographic algorithm’s key length, complexity and resistance techniques it would be possible to verify the authentication of legitimate user and unauthorized user (Jain & Nandakumar, 2012). On the other hand, implication of biometric security also may prevent data loss and data accessibility to an unauthorized member.  

In order to highlight the history of biometrics security, it can be asserted that thousand years before human usually used voice, gait and face of the individuals with an intention of recognizing proper identity. Based on that particular idea, biometric security technology has been introduced, which usually used for identification and verification purpose. In the contemporary era, biometric algorithms are designed in such a manner, which usually help to detect fingerprint, face, hand geometry, voice and IRIS among others. 

Applications of Biometric Security System

Similarly, in order to highlight the applications of biometric security, it can be asserted that biometric security vastly used in case of commercial applications such as electronic data security, e-commerce and computer network logins and internet access among others. Apart from this, biometric security also used in case of cellular phones and ATMs and credit cards physical access control purpose (Hassanain, Shaarawy & Hesham, 2010). On the contrary, it is also viewed that biometric security also used in case of government associated applications such as driver’s licenses, border control, passport control, social security and in case of national ID cards (Kanak & Sogukpinar, 2012).

In accordance with Hong and Jung (2014), traditionally biometric security system has been used in case of commercial applications based on knowledge based approach for the identification or recognition of PINs and passwords. However, in the contemporary era government applications are also using biometric security system based on ID cards and badges for identification of authorized accessibility (Jain & Nandakumar, 2012). Similarly, the forensic applicant is also using security tokens during the data and information access purpose.

 

Based on the viewpoint of Biggio et al. (2015) it is recognized that biometric security system is relied on certain parameters such as uniqueness, collectability, universality, permanence, performance, acceptability and circumvention. For an instance, each person having a unique DNA and it is impossible to make a duplicate of it (Barman, Samanta & Chattopadhyay, 2015). Thus, it can be stated that biometric security may ensure the authentic access on a database. Similarly, parameter indicates unique characteristics of a person such as retinal and iris identity, which is cannot be replicated. Thus, biometric security may ensure the safety or confidentiality of any personnel data, which is projected by the help of biometric password.

Similarly, collectability is being considered as one of the key parameters, which usually helps to identify the characteristic and traits of an individual. In relation to this, it can be asserted that through emphasizing towards the biometric security, it is possible to ensure the accuracy and robustness of a verification process (Kanak & Sogukpinar, 2012). Consequently, it is also viewed that through concentrating on acceptability, it is possible to prevent the chances of failure in case of verification process and it also ensure validate acceptance on a biometric technologies.

Effectiveness of Biometric Security System

Through the help of biometric security system, it is possible to recognize and identity authentic process, which ensures high security in case of secured computer and doors. Thus, it can be claimed that through the help of biometric security system, individuals may mitigate data loss associated risk and problems in a more effective as well as efficient manner (Barman, Samanta & Chattopadhyay, 2015). In relation to this, it can be claimed that through adoption of biometric security it is possible to minimize the burden of complicated and long password necessities of the individuals, by saving time and investment.

Issues of Biometric Security System

Though biometric security systems have lot of effectiveness in its application still it shows lot of issues also, during its performance. Most of the manufacturers are claiming that there is no problem with their products but the most common issues that happen with their devices are the recognition problems. In recent time it is found that the common problem of the biometric security are lifted finger prints, making a gummy eyeball, or attempting to mimic someone’s gait that are not recognized by the device even they are original. This type of problem is not only slows or hinder the process but it also raise question on its security (Kanak & Sogukpinar, 2012). Recent technological advancement is the main issue for the biometric user because they are easily making fake identification for biometric device that can have unauthorized usage and loss of data.

 

References

Barman, S., Samanta, D., & Chattopadhyay, S. (2015). Fingerprint-based crypto-biometric system for network security. EURASIP Journal on Information Security, 2015(1).

Biggio, B., Fumera, G., Russu, P., Didaci, L., & Roli, F. (2015). Adversarial Biometric Recognition: A review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Process. Mag., 32(5), 31-41.

Hassanain, K., Shaarawy, M. & Hesham, E., (2010). A proposal for a biometric key dependent cryptosystem. Global Journal of Computer Science and Technology, 10(11), 42-47.

Hong, K., & Jung, E. (2014). Hand Biometric Information Recognition System of Mobile Phone Image for Mobile Security. Journal Of Digital Convergence, 12(4), 319-326.

Jain, A., & Nandakumar, K. (2012). Biometric Authentication: System Security and User Privacy. Computer, 45(11), 87-92.

Kanak, A., & Sogukpinar, I. (2012). BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication. Security and Communication Networks, 7(1), 123-138.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2017). Fundamental Of Security Technology. Retrieved from https://myassignmenthelp.com/free-samples/fundamental-of-security-technology.

"Fundamental Of Security Technology." My Assignment Help, 2017, https://myassignmenthelp.com/free-samples/fundamental-of-security-technology.

My Assignment Help (2017) Fundamental Of Security Technology [Online]. Available from: https://myassignmenthelp.com/free-samples/fundamental-of-security-technology
[Accessed 04 August 2020].

My Assignment Help. 'Fundamental Of Security Technology' (My Assignment Help, 2017) <https://myassignmenthelp.com/free-samples/fundamental-of-security-technology> accessed 04 August 2020.

My Assignment Help. Fundamental Of Security Technology [Internet]. My Assignment Help. 2017 [cited 04 August 2020]. Available from: https://myassignmenthelp.com/free-samples/fundamental-of-security-technology.


With a decade's experience in providing essay help, MyAssignmenthelp.com has emerged as the leading assignment writing company in Australia. We have gained our popularity not because we provide top-quality essay help, but because we understand students' needs. In order to help students, we have introduced proposal essay help, literature essay help, etc into our services. Some of our popular services include English essay help, nursing essay help, law essay help, MBA essay help and much more.

Latest Samples

BUS5SBF Statistics For Business And Finance For Household Heads

Download : 0 | Pages : 4
  • Course Code: BUS5SBF
  • University: La Trobe University
  • Country: Australia

Answer: A simple random sample of size 250 was drawn with random seed being 2104. Each population member has an equal chance of being selected in the simple random sampling process. It entails each data point to be assigned a probability of inclusion in the sample. Thus, due to its probabilistic nature, characteristics such as gender and education and even sampling error could be objectively studied and quantified. It gives equal probability of ...

Read More arrow

NSG2NMR Nursing Clinical Issue For Overall Lifestyle Habits

Download : 0 | Pages : 9
  • Course Code: NSG2NMR
  • University: La Trobe University
  • Country: Australia

Answer: Obesity in Toddlers Obesity in very young children is a common health issue. It occurs when the toddler`s BMI (height and weight ratio) is above the child`s age. Many factors have been linked with obesity in toddlers, including genetics, overall lifestyle habits, and inadequate body exercises among other contributing factors. The health effects of toddler obesity are similar to those in adults. Short term risks of toddler obesity inclu...

Read More arrow

ECOM4000 Economics For The Production Of Goods And Services

Download : 0 | Pages : 6

Answer: In terms of the conceptual framework of economics, the term “Economies of Scale” refers to the cost advantage, which the production firms enjoy with increase in their scale of operations. in general, there are two types of costs incurred by a firm in its production process, the fixed cost and the variable cost of production. With increase in the production of goods and services, the per unit input costs of the production goes...

Read More arrow

BN104 Memory Management For Fragmentation And Memory Mapping

Download : 0 | Pages : 4

Answer: BQ1 Memory Management Paging The starting address of frame 1 is 1025 and the end address of frame 1 is 2048. Yes No, because Frame 3 is kept free. Page 3, 6, and 7 are not loaded in memory. The paging system works by bringing the page from the secondary memory to main memory. CPU generates logical address for the secondary memory. These address are changed to physical address for finding the data in the main memory [4]. When pro...

Read More arrow

BTM-8107 Statistics For Parametric And Non-Parametric Test

Download : 0 | Pages : 4
  • Course Code: BTM-8107
  • University: Northcentral University
  • Country: United States

Answer: The choice to select the type of test is dependent on the distribution of data. Parametric test is used when the sample data is normally distributed. Non-parametric test is used when we are unsure about the distribution of the data. The presence of outliers does not affect the outcome of non-parametric tests. The outcome of non-parametric test is a score or ranking of the data sample. Moreover, a non-parametric test provides a ranking of...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,377,052

Orders

4.9/5

Overall Rating

5,084

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

610 Order Completed

100% Response Time

Cheryl Zhao

PhD in Statistics

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

453 Order Completed

98% Response Time

Howard Asuncion

LLM in Criminal Law

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

529 Order Completed

95% Response Time

Ivan Blank

PhD in Functional Human Biology

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

93 Order Completed

100% Response Time

Jackson Mitchell

MiM (Masters in Management) in Supply Chain Management

New Jersey, United States

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

Awesome work. Awesome response time. Very thorough & clear. Love the results I get with MAH!

flag

User Id: 383727 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

Work was done in a timely manner took it through grammarly checked for plagiarism very well satisfied

flag

User Id: 463334 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

Great work for the short notice given. Thank you for never disappointing and helping out.

flag

User Id: 194216 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating

I received a full point on the assignment. Thank you for all the help with the assignment.

flag

User Id: 411395 - 31 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?