In the contemporary era, security technology has been developed in a significant manner, which has ensured the safety as well as privacy of essential data and other important aspects. Moreover, development of security technology also has enhanced the features of cryptography technology, which usually used in case of maintaining information security. In this context, Hassanain, Shaarawy and Hesham (2010) argued that through emphasizing towards cryptographic algorithm’s key length, complexity and resistance techniques it would be possible to verify the authentication of legitimate user and unauthorized user (Jain & Nandakumar, 2012). On the other hand, implication of biometric security also may prevent data loss and data accessibility to an unauthorized member.
In order to highlight the history of biometrics security, it can be asserted that thousand years before human usually used voice, gait and face of the individuals with an intention of recognizing proper identity. Based on that particular idea, biometric security technology has been introduced, which usually used for identification and verification purpose. In the contemporary era, biometric algorithms are designed in such a manner, which usually help to detect fingerprint, face, hand geometry, voice and IRIS among others.
Similarly, in order to highlight the applications of biometric security, it can be asserted that biometric security vastly used in case of commercial applications such as electronic data security, e-commerce and computer network logins and internet access among others. Apart from this, biometric security also used in case of cellular phones and ATMs and credit cards physical access control purpose (Hassanain, Shaarawy & Hesham, 2010). On the contrary, it is also viewed that biometric security also used in case of government associated applications such as driver’s licenses, border control, passport control, social security and in case of national ID cards (Kanak & Sogukpinar, 2012).
In accordance with Hong and Jung (2014), traditionally biometric security system has been used in case of commercial applications based on knowledge based approach for the identification or recognition of PINs and passwords. However, in the contemporary era government applications are also using biometric security system based on ID cards and badges for identification of authorized accessibility (Jain & Nandakumar, 2012). Similarly, the forensic applicant is also using security tokens during the data and information access purpose.
Based on the viewpoint of Biggio et al. (2015) it is recognized that biometric security system is relied on certain parameters such as uniqueness, collectability, universality, permanence, performance, acceptability and circumvention. For an instance, each person having a unique DNA and it is impossible to make a duplicate of it (Barman, Samanta & Chattopadhyay, 2015). Thus, it can be stated that biometric security may ensure the authentic access on a database. Similarly, parameter indicates unique characteristics of a person such as retinal and iris identity, which is cannot be replicated. Thus, biometric security may ensure the safety or confidentiality of any personnel data, which is projected by the help of biometric password.
Similarly, collectability is being considered as one of the key parameters, which usually helps to identify the characteristic and traits of an individual. In relation to this, it can be asserted that through emphasizing towards the biometric security, it is possible to ensure the accuracy and robustness of a verification process (Kanak & Sogukpinar, 2012). Consequently, it is also viewed that through concentrating on acceptability, it is possible to prevent the chances of failure in case of verification process and it also ensure validate acceptance on a biometric technologies.
Through the help of biometric security system, it is possible to recognize and identity authentic process, which ensures high security in case of secured computer and doors. Thus, it can be claimed that through the help of biometric security system, individuals may mitigate data loss associated risk and problems in a more effective as well as efficient manner (Barman, Samanta & Chattopadhyay, 2015). In relation to this, it can be claimed that through adoption of biometric security it is possible to minimize the burden of complicated and long password necessities of the individuals, by saving time and investment.
Though biometric security systems have lot of effectiveness in its application still it shows lot of issues also, during its performance. Most of the manufacturers are claiming that there is no problem with their products but the most common issues that happen with their devices are the recognition problems. In recent time it is found that the common problem of the biometric security are lifted finger prints, making a gummy eyeball, or attempting to mimic someone’s gait that are not recognized by the device even they are original. This type of problem is not only slows or hinder the process but it also raise question on its security (Kanak & Sogukpinar, 2012). Recent technological advancement is the main issue for the biometric user because they are easily making fake identification for biometric device that can have unauthorized usage and loss of data.
Barman, S., Samanta, D., & Chattopadhyay, S. (2015). Fingerprint-based crypto-biometric system for network security. EURASIP Journal on Information Security, 2015(1).
Biggio, B., Fumera, G., Russu, P., Didaci, L., & Roli, F. (2015). Adversarial Biometric Recognition: A review on biometric system security from the adversarial machine-learning perspective. IEEE Signal Process. Mag., 32(5), 31-41.
Hassanain, K., Shaarawy, M. & Hesham, E., (2010). A proposal for a biometric key dependent cryptosystem. Global Journal of Computer Science and Technology, 10(11), 42-47.
Hong, K., & Jung, E. (2014). Hand Biometric Information Recognition System of Mobile Phone Image for Mobile Security. Journal Of Digital Convergence, 12(4), 319-326.
Jain, A., & Nandakumar, K. (2012). Biometric Authentication: System Security and User Privacy. Computer, 45(11), 87-92.
Kanak, A., & Sogukpinar, I. (2012). BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication. Security and Communication Networks, 7(1), 123-138.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2017). Fundamental Of Security Technology. Retrieved from https://myassignmenthelp.com/free-samples/fundamental-of-security-technology.
"Fundamental Of Security Technology." My Assignment Help, 2017, https://myassignmenthelp.com/free-samples/fundamental-of-security-technology.
My Assignment Help (2017) Fundamental Of Security Technology [Online]. Available from: https://myassignmenthelp.com/free-samples/fundamental-of-security-technology
[Accessed 17 January 2020].
My Assignment Help. 'Fundamental Of Security Technology' (My Assignment Help, 2017) <https://myassignmenthelp.com/free-samples/fundamental-of-security-technology> accessed 17 January 2020.
My Assignment Help. Fundamental Of Security Technology [Internet]. My Assignment Help. 2017 [cited 17 January 2020]. Available from: https://myassignmenthelp.com/free-samples/fundamental-of-security-technology.
With a decade's experience in providing essay help, MyAssignmenthelp.com has emerged as the leading assignment writing company in Australia. We have gained our popularity not because we provide top-quality essay help, but because we understand students' needs. In order to help students, we have introduced proposal essay help, literature essay help, etc into our services. Some of our popular services include English essay help, nursing essay help, law essay help, MBA essay help and much more.
Answer: Introduction: Crime prevention is an emerging concept that is applied by several security agencies to reduce crime rate in the society. It is an approach that focuses on preventing the crime rather than dealing with the consequences after it has happened. (Crime, 2008) A lot of attention is therefore given to crime prevention rather than detecting the criminals and punishing them. It evaluates the conditions and circumstances tha...Read More
Answer: Introduction: In evidence based practice, the critical review and analysis of research papers supports nurses in applying research evidence in real setting (Hall & Roussel, 2016). This essay aims to conduct a critical analysis of research paper to resolve the problem presented in the case scenario related to Tasso, a 21 year old computer programmer who witnessed serious motor vehicle problem and is suffering from post...Read More
Answer: Chronic illnesses have risen in number with fears of increasing risks for further increase in such ilnesses. This is due to environmental risks such as air pollution, smoking, lack of physical activities and unhealthy diets (Celler, & New South Wales University Sydney, 2017). Self-care among patients with chronic diseases is an important aspect of health managements. In the recent years, chronic management programs have shifted to ...Read More
Answer: Introduction: There are many factors affecting the demand for hospitality or tourism in a country. In this paper, I chose to look into how politics as one of the elements can affect the tourism sector in a country. Tourism plays a major role in any political grounds of any nation in the globe. When people travel away from their home to other destinations, the political climate in those areas tends to affect their stay. The artic...Read More
Answer: Introduction: The following research focuses on the marketing strategies that Amazon Australia used since it started its business in Australia. Theoretical approaches have been used to understand the relevant marketing strategies. Besides, the marketing strategies that the company can use in the future have also been discussed in the following research. Company overview: Amazon.com, Inc. is an electronic commerce company...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
The instructor like the assignment and no need to redo it. She was impressed by the quality of the assignment.
The deadline for my assignment passed by a few hours but the finished result was correct and looked great! The customer service chat line is very quick to get you answers and responses. I will definitely use them again in the future!
I am always excited to see the grades because I have full confidence in the writers.
I love this company it’s some dislike about it but I love the experts that helps with the assignment