StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometrics: Unseen Aspects - Assignment Example

Cite this document
Summary
As the paper "Biometrics: Unseen Aspects" tells, manufacturers have identified the production of biometric authentication systems as a growing industry.  The technique has succeeded in preventing physical existence in highly protected environments but the success of the method is still skeptical…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful
Biometrics: Unseen Aspects
Read Text Preview

Extract of sample "Biometrics: Unseen Aspects"

?Biometrics: Some Unseen Aspects Biometrics: Some Unseen Aspects Introduction Biometrics is the computerized method ortechnique of recognizing a person on the basis of physical or behavioral characteristics. Instead of the traditional security systems, the society today needs new verification systems to be in use; this is where the biometric authentication has gained its relevance. The production of biometric authentication systems has been increasing for the recent years. Numerous manufacturers and distributors have identified it as a growing industry. The technique has succeeded in preventing physical existence from highly protected environments. However the success of the method is still skeptical where network authentication is considered. Advantages There has been varied and large number of arguments in favor of adopting the biometric authentication for network access. Among them the most accepted argument is the uniqueness of biometric characteristics. This uniqueness of the biometric characteristic helps to make it an ideal candidate authenticating technology. There is no better way to authenticate an individual’s identity than verifying his inherent and unique attributes; at first his fingerprints. The use of fingerprints as system of identification can be traced back to the 1850s; evidence to this belief is the establishment of Scotland Yards Central Fingerprinting Bureau in 1901. Another view that supports the biometrics is that the principle of network security is least disputed. In this system, the individual cannot forget the password or transfer the password to somebody as it is a unique physical attribute. This may be the most driven argument that supports the biometric authentication technique. Again, the next argument in this phase is also regarding the security. It is not possible to duplicate a biometric feature of an individual during the data uploading stage or in the verification stage. In the traditional method of token system, the user ID and the password may be easily replicated, which is not possible at all in the biometric authenticating technology. These unique characteristics cannot be lost or stolen. Disadvantages In the same way, there are several arguments against the introduction of the particular technological advancement—biometric authentication technology. Though the cost for the implementation of the biometric technology is coming down, still it is too expensive. While implementing the system, it is not enough to acquire the hardware and the software, but they are to be linked with the current networking. The cost return ratio is very low in the technology even though it helps to reduce the administration overheads. Although many find biometric authentication systems to be very successful, they ignore the fact that the same authentication data can be misused in multiple applications. When the user inputs his biometric authentication data for his identity in a particular application, the same data can be used to authenticate that person in a different application. It is a threat to the person’s security over his properties. For an example, if a user authenticates himself with his biometric characteristics to get access to airlines, an unwanted person can gain access to the user’s bank account, car, etc with the same authentication data, which can be hacked from the network easily. Scientists say that these problems will be outsourced by the invention of further advanced systems. However, how far the technology goes, till there will be its disadvantages too. Besides, as Vaca (2007) points out, in the biometric authentication technology, first of all, the person who captures the raw biometric data must be trust worthy person, as they have the option of keeping the raw data with themselves. Ethical Issues The controversy of the technological advancement has put forward so many social and ethical impacts. The biometrical authentication systems raise many ethical issues regarding the concept of privacy. These issues are not the same as other security measures of personal identification. There are specific privacy issues related with the biometric ID of the user. A good example for the ethical issue regarding the privacy is described by Simon (2000); he says about a marketing company using the state prison inmates to process computer tapes containing the personal information on more than 90 percent of the American households. A woman started to receive threats from a convicted rapist after he viewed her life (p.136). This incident shows the great concern regarding the privacy over the data storage. Another moral issue regarding the use of biometric authentication technology is that a stalker can gain information about an individual from the database and use it to harass or harm him/her. Some of the other social, legal and ethical concerns regarding the biometric inventions include the worries about the centralization of information, the development for a unique identifier, and the most of all the human interdependence on the technology which is now called the informatization of the body. There has been much doubt about the handling of the biometric data concerning the unauthorized access to personal information. An organization that manages the biometrical data can craft unethical use of the data to obtain financial advantage or for other intentions. Technical errors can also lead to huge security problems as the decrypted biometric data of personal information may be leaked through the intranet or extranet of the network. A disgruntled programmer can get access to such data and can alter the data to make wrong Id matches. A computer hacker can easily get to the data and to the so called well protected algorithms. “Carefully guarded algorithms does not mean much when Pentagon sites are hacked and disk drives with nuclear secrets are carried around like lunch boxes” (Alterman, 2003, p. 143). In short, threat to the privacy is the most important ethical impact of the technological advancement. Conclusion In total, the technological advancements like the biometrical authentication systems are a first step toward creating a technologically advanced global village. However, while struggling to accomplish such objectives we forget the problems they create. Such technological advancement causes heavy impacts on the society as well as on the environment. Moreover, such systems, no matter how far developed, may not be successful in keeping the privacy of the user. What is most concerned in developing a technology must be the privacy of the individuals. References Alterman, A. (2003). A piece of yourself: Ethical issues in biometric identification. Ethics and Information Technology.Kluwer Academic Publishers, 5, 139-150. Retrieved from http://www.hideproject.org/downloads/references/Alterman-A_Piece_of_yourself.pdf Simon, L. D. (2000). NetPolicy.com: Public Agenda for a Digital World. USA: Woodrow Wilson Center Press. Vacca, J. (2007). Biometric Technologies and Verification Systems. USA: Butterworth- Heinemann. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Biometrics Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1429505-biometric-controversy
(Biometrics Assignment Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/information-technology/1429505-biometric-controversy.
“Biometrics Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1429505-biometric-controversy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometrics: Unseen Aspects

Biometric Authentication

It embodies the essential aspects of role-based access control.... This assignment "Biometric Authentication" presents biometric authentication in the context of the Ministry of Defense and its necessities, alternatives, weaknesses, and strengths among other pertinent issues.... The era that we live in is computer-centered....
8 Pages (2000 words) Assignment

Biometric Authentication

The 'Flat Role-Based Access Control' comes first and exemplifies the basic role-based access management aspects.... Strengths and Weaknesses of the PALM biometrics and Reliability and Authentication of this Mechanism PALM biometrics systems are used interchangeably with palm vein biometric method....
7 Pages (1750 words) Essay

Oppressive Gender Relations in Heteronormative Societies

This essay "Oppressive Gender Relations in Heteronormative Societies" explores several readings and how they portray the prevalence of heteronormativity in their respective fields of study.... Gender, politics, and race intersect in producing repressive heteronormative gender relations.... ... ... ...
5 Pages (1250 words) Essay

The Unknown Citizen by W H Auden

The techniques of surveillance (Surveillance literally means ‘to watch from above'), or the subtle art/science of prying into our private lives, have become so pervasive that today it has become a major topic of study under Culture Studies, the discipline that deals with popular culture and its related aspects including mass media and music....
7 Pages (1750 words) Essay

Data and Network Security

This paper ''Data and Network Security'' tells that The company is known as 'Enterprise Training Solutions' is involved in the primary activity of providing training services and is based in Leeds, England as well as in Edinburgh, Scotland.... At present, the total workforce of the company at Leeds totals to around 400 personnel....
11 Pages (2750 words) Essay

Letters Arts and Sciences themes DIVERSITY and ETHICS and their relationship to globalization

An important aspect of real leadership is the close by association amongst the leader and the follower that governs the accomplishment of the leader's task.... But, lacking motivation, participation, and reassurance from both parties, the rapport agonizes and this leader-follower.... ... ... However, leaders, especially, must exert additional work to reach out to supporters so as to start and progress this cooperation that is essential to the attainment of the objectives. ...
12 Pages (3000 words) Research Paper

Safety of Biometric Authentication

he biometrics technology does not go without fault as it has been termed as both a promising and disruptive technology.... The paper "Safety of Biometric Authentication" explains biometric authentication ensures individual and state safety by restricting access to security details to key people....
7 Pages (1750 words) Essay

The History and Evolution of Border Security

This essay explores the history of the US border security controls used over its colonies and allied territories.... Particular attention is paid to the Border patrol under the Department of Homeland Security, whose competence was to protect borders from illegal immigration, trade, and customs.... ...
11 Pages (2750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us