$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!


Describe about history of biometric security, applications of biometric security system, effectiveness of biometric security System and issues of biometric security system.



History of Biometric Security

In the contemporary era, security technology has been developed in a significant manner, which has ensured the safety as well as privacy of essential data and other important aspects. Moreover, development of security technology also has enhanced the features of cryptography technology, which usually used in case of maintaining information security. In this context, Hassanain, Shaarawy and Hesham (2010) argued that through emphasizing towards cryptographic algorithm’s key length, complexity and resistance techniques it would be possible to verify the authentication of legitimate user and unauthorized user (Jain & Nandakumar, 2012). On the other hand, implication of biometric security also may prevent data loss and data accessibility to an unauthorized member.  

In order to highlight the history of biometrics security, it can be asserted that thousand years before human usually used voice, gait and face of the individuals with an intention of recognizing proper identity. Based on that particular idea, biometric security technology has been introduced, which usually used for identification and verification purpose. In the contemporary era, biometric algorithms are designed in such a manner, which usually help to detect fingerprint, face, hand geometry, voice and IRIS among others. 

Applications of Biometric Security System

Similarly, in order to highlight the applications of biometric security, it can be asserted that biometric security vastly used in case of commercial applications such as electronic data security, e-commerce and computer network logins and internet access among others. Apart from this, biometric security also used in case of cellular phones and ATMs and credit cards physical access control purpose (Hassanain, Shaarawy & Hesham, 2010). On the contrary, it is also viewed that biometric security also used in case of government associated applications such as driver’s licenses, border control, passport control, social security and in case of national ID cards (Kanak & Sogukpinar, 2012).

In accordance with Hong and Jung (2014), traditionally biometric security system has been used in case of commercial applications based on knowledge based approach for the identification or recognition of PINs and passwords. However, in the contemporary era government applications are also using biometric security system based on ID cards and badges for identification of authorized accessibility (Jain & Nandakumar, 2012). Similarly, the forensic applicant is also using security tokens during the data and information access purpose.


Based on the viewpoint of Biggio et al. (2015) it is recognized that biometric security system is relied on certain parameters such as uniqueness, collectability, universality, permanence, performance, acceptability and circumvention. For an instance, each person having a unique DNA and it is impossible to make a duplicate of it (Barman, Samanta & Chattopadhyay, 2015). Thus, it can be stated that biometric security may ensure the authentic access on a database. Similarly, parameter indicates unique characteristics of a person such as retinal and iris identity, which is cannot be replicated. Thus, biometric security may ensure the safety or confidentiality of any personnel data, which is projected by the help of biometric password.

Similarly, collectability is being considered as one of the key parameters, which usually helps to identify the characteristic and traits of an individual. In relation to this, it can be asserted that through emphasizing towards the biometric security, it is possible to ensure the accuracy and robustness of a verification process (Kanak & Sogukpinar, 2012). Consequently, it is also viewed that through concentrating on acceptability, it is possible to prevent the chances of failure in case of verification process and it also ensure validate acceptance on a biometric technologies.

Effectiveness of Biometric Security System

Through the help of biometric security system, it is possible to recognize and identity authentic process, which ensures high security in case of secured computer and doors. Thus, it can be claimed that through the help of biometric security system, individuals may mitigate data loss associated risk and problems in a more effective as well as efficient manner (Barman, Samanta & Chattopadhyay, 2015). In relation to this, it can be claimed that through adoption of biometric security it is possible to minimize the burden of complicated and long password necessities of the individuals, by saving time and investment.

Issues of Biometric Security System

Though biometric security systems have lot of effectiveness in its application still it shows lot of issues also, during its performance. Most of the manufacturers are claiming that there is no problem with their products but the most common issues that happen with their devices are the recognition problems. In recent time it is found that the common problem of the biometric security are lifted finger prints, making a gummy eyeball, or attempting to mimic someone’s gait that are not recognized by the device even they are original. This type of problem is not only slows or hinder the process but it also raise question on its security (Kanak & Sogukpinar, 2012). Recent technological advancement is the main issue for the biometric user because they are easily making fake identification for biometric device that can have unauthorized usage and loss of data.



Barman, S., Samanta, D., & Chattopadhyay, S. (2015). Fingerprint-based crypto-biometric system for network security. EURASIP Journal on Information Security, 2015(1).

Biggio, B., Fumera, G., Russu, P., Didaci, L., & Roli, F. (2015). Adversarial Biometric Recognition: A review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Process. Mag., 32(5), 31-41.

Hassanain, K., Shaarawy, M. & Hesham, E., (2010). A proposal for a biometric key dependent cryptosystem. Global Journal of Computer Science and Technology, 10(11), 42-47.

Hong, K., & Jung, E. (2014). Hand Biometric Information Recognition System of Mobile Phone Image for Mobile Security. Journal Of Digital Convergence, 12(4), 319-326.

Jain, A., & Nandakumar, K. (2012). Biometric Authentication: System Security and User Privacy. Computer, 45(11), 87-92.

Kanak, A., & Sogukpinar, I. (2012). BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication. Security and Communication Networks, 7(1), 123-138.


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2017). Fundamental Of Security Technology. Retrieved from

"Fundamental Of Security Technology." My Assignment Help, 2017,

My Assignment Help (2017) Fundamental Of Security Technology [Online]. Available from:
[Accessed 17 January 2020].

My Assignment Help. 'Fundamental Of Security Technology' (My Assignment Help, 2017) <> accessed 17 January 2020.

My Assignment Help. Fundamental Of Security Technology [Internet]. My Assignment Help. 2017 [cited 17 January 2020]. Available from:

With a decade's experience in providing essay help, has emerged as the leading assignment writing company in Australia. We have gained our popularity not because we provide top-quality essay help, but because we understand students' needs. In order to help students, we have introduced proposal essay help, literature essay help, etc into our services. Some of our popular services include English essay help, nursing essay help, law essay help, MBA essay help and much more.

Latest Samples

COM15: Developing Research And Analytical Skills

Download : 0 | Pages : 7
  • Course Code: COM15
  • University: Griffith University
  • Country: Australia

Answer: Introduction: Crime prevention is an emerging concept that is applied by several security agencies to reduce crime rate in the society. It is an approach that focuses on preventing the crime rather than dealing with the consequences after it has happened. (Crime, 2008) A lot of attention is therefore given to crime prevention rather than detecting the criminals and punishing them. It evaluates the conditions and circumstances tha...

Read More arrow

HLSC122 Critical Appraisal Scenarios

Download : 0 | Pages : 7

Answer: Introduction:    In evidence based practice, the critical review and analysis of research papers supports nurses in applying research evidence in real setting (Hall & Roussel, 2016). This essay aims to conduct a critical analysis of research paper to resolve the problem presented in the case scenario related to Tasso, a 21 year old computer programmer who witnessed serious motor vehicle problem and is suffering from post...

Read More arrow

CNA576 Self Management In Renal Nursing For Chronic Illness Patients

Download : 0 | Pages : 6

Answer: Chronic illnesses have risen in number with fears of increasing risks for further increase in such ilnesses. This is due to environmental risks such as air pollution, smoking, lack of physical activities and unhealthy diets (Celler, & New South Wales University Sydney, 2017). Self-care among patients with chronic diseases is an important aspect of health managements. In the recent years, chronic management programs have shifted to ...

Read More arrow

ECO332 Global Economic Impact Of Tourism

Download : 0 | Pages : 2

Answer: Introduction: There are many factors affecting the demand for hospitality or tourism in a country. In this paper, I chose to look into how politics as one of the elements can affect the tourism sector in a country.  Tourism plays a major role in any political grounds of any nation in the globe. When people travel away from their home to other destinations, the political climate in those areas tends to affect their stay. The artic...

Read More arrow

MKT00720 Nature Of Amazon Australia Marketing Strategy

Download : 0 | Pages : 8

Answer: Introduction:  The following research focuses on the marketing strategies that Amazon Australia used since it started its business in Australia. Theoretical approaches have been used to understand the relevant marketing strategies. Besides, the marketing strategies that the company can use in the future have also been discussed in the following research. Company overview:, Inc. is an electronic commerce company...

Read More arrow

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 4/5

1309 Order Completed

100% Response Time

Gemmie Chen

MSc in Nursing

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

265 Order Completed

97% Response Time

Ken Campbell

MSc in Electrical Engineering

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

203 Order Completed

97% Response Time

Richard Alpert

PhD in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1692 Order Completed

98% Response Time

Alfred Dodd

PhD in Computer and Information Science with specialization in Database

Wellington, New Zealand

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

The instructor like the assignment and no need to redo it. She was impressed by the quality of the assignment.


User Id: 364013 - 17 Jan 2020


student rating student rating student rating student rating student rating

The deadline for my assignment passed by a few hours but the finished result was correct and looked great! The customer service chat line is very quick to get you answers and responses. I will definitely use them again in the future!


User Id: 363787 - 17 Jan 2020


student rating student rating student rating student rating student rating

I am always excited to see the grades because I have full confidence in the writers.


User Id: 106921 - 17 Jan 2020


student rating student rating student rating student rating student rating

I love this company it’s some dislike about it but I love the experts that helps with the assignment


User Id: 334177 - 17 Jan 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?