StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometrics: a tool for information security - Essay Example

Cite this document
Summary
In the paper, an information security related article will be reviewed to know what technology has been or is being researched to make information security more and more reliable. Information security has been one of the main problems for people and organizations adopting the use of information technology…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Biometrics: a tool for information security
Read Text Preview

Extract of sample "Biometrics: a tool for information security"

INFORMATION SECURITY – ARTICLE EVALUATIONInformation security has been one of the main problems for people and organizations adopting the use of information technology. With the new advancements taking place in the field of computer sciences and information technology, ensuring information security is also becoming more and more difficult due to more organized intrusion and data retrieval attempts by hackers. Although many new measures have been introduced to make information security reliable, but none of them has been able to guarantee complete information protection.

In such circumstances, it is necessary to design a reliable system that can minimize the chances of unauthorized use of information. In this paper, an information security related article will be reviewed to know what technology has been or is being researched to make information security more and more reliable.Article: ‘Biometrics: a tool for information security’In this article, the researchers have proposed the use of biometric technology as an information security measure. The main purpose behind proposing this technology is to make identity identification more reliable and secure.

The researchers claim that identity verification is the most serious issue that needs to be addressed to ensure maximum security of the information stored on networks or on personal computers. This seems true because hackers mostly attempt to intrude into the systems to get private information. Therefore, the need of using an effective technology becomes essential that should first verify the identity of the person trying to access the information and then permit him/her to access the required information.

The researchers also say that due to rapid advancements in the areas of communication, networking, mobility, and information technology, the need to increase the use of reliable and trustworthy user authentication techniques has become essential (Jain, Ross, & Pankanti, 2006, p. 125). Therefore, they have proposed the use of biometrics for civilian, commercial, and forensic applications as an effective user authentication measure. The researchers have described this technology as a science of recognizing people on account of their behavioral attributes or physical appearance.

This technology seems to be effective in dealing with the issue of information security considering its way of working. For example, it stores the physical attributes of the users of the system in which the information is stored. The technology then matches all stored attributes with the attributes of the person trying to access the system. Only in case a match is found, the system becomes accessible for the person. The researchers have adopted a well-structured format to write this article. For example, they have first provided an overview of the biometric technology and then moved on to discuss some of the salient issues that still need some research and exploration in order for this technology to be proven as the best tool to ensure information security.

After this, some challenges related to the use of biometric technology in the real world have been defined and discussed before focusing on their solutions. Summing it up, the information security issue is very well researched and presented in a manner that helps readers gain an in-depth insight into the issue.ReferencesJain, A., Ross, A., & Pankanti, S. (2006). Biometrics: a tool for information security. Information Forensics and Security, 1(2), 125-143.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Biometrics: a tool for information security Essay”, n.d.)
Biometrics: a tool for information security Essay. Retrieved from https://studentshare.org/information-technology/1639297-biometrics-a-tool-for-information-security
(Biometrics: A Tool for Information Security Essay)
Biometrics: A Tool for Information Security Essay. https://studentshare.org/information-technology/1639297-biometrics-a-tool-for-information-security.
“Biometrics: A Tool for Information Security Essay”, n.d. https://studentshare.org/information-technology/1639297-biometrics-a-tool-for-information-security.
  • Cited: 1 times

CHECK THESE SAMPLES OF Biometrics: a tool for information security

Privacy in Biometrics

At the same time, biometrics has also helped the e-commerce industry to progress by ensuring the security of data in finance-related organizations such as banks, shopping centers, etc that now use biometrics technology (Zhang, 2006, pp.... While this utilization became the reason for its popularity, it has resulted in the initiation of debates regarding the confidentiality and security of the data; in other words, data and information management by law enforcement agencies and various governments globally (Ex-sight, n....
8 Pages (2000 words) Essay

Biometric Technology for Singapore: An Analysis

echnologyTechnological aspects governing adoption of biometrics technology include the following concerns:for information security, preferred storage option should be reducing the biometric to a template than a stored image.... security scenario has drastically changed across the world over past few decades, and especially after Sep 11 2001.... Terrorist organisations across the world have capitalised on socio-cultural differences and conflicts prevailing in the world by playing one community or religion against another, and thereby seeking shelters in some countries with a view to targeting other countries under names of religious wars. … Consequently most governments have had to re-think their security strategies and allocate special budgets to counter this potent threat of terrorism....
10 Pages (2500 words) Essay

Specialized Field of Security Management

In the specialized field of security management, the primary concern of the manager is ensuring safety and protection of all the resources of the organization.... The function entails detection of any kind of intrusion and initiating appropriate actions to ward off and prevent harm… As advances in technology have been development, facilities and features ensuring the safety and security of organizations have adapted to these technological developments....
3 Pages (750 words) Essay

The Biometric System and Its Use

But, the extent to which it has made us safer is still being debated. While on the one hand we have advanced security gadgets, on the other the acts of Biometric technology is an effort to diagnose the problems and fill some of the loopholes in the security setup.... As of now it is being said that it'll be almost impossible to change the biometric features of human body, which in turn will help the security people to prepare a reliable database and identify the people with criminal background....
4 Pages (1000 words) Essay

Biometric Authentication Systems

The need for reliability has led to heightened concerns about security increased advancements in communication, mobility, and networking.... nbsp; biometrics recognition is, therefore, the automatic recognition of users based on behavioral and physiological characteristics.... biometrics seeks to establish a user's identity based on who she is rather what she possesses like an ID card or what she remembers like passwords.... biometrics gained popularity when body measurements were used by Alphonse Bertillon to identify criminals in the 19th century....
10 Pages (2500 words) Essay

Case Study of a Biomatric surveillance technology on primary school children

As a tool for social sorting, surveillance encourages social inequalities by identifying and differentiating people(Monahan, 2011).... The theory underpinning the effectiveness of public surveillance systems, including biometrics and CCTV, is that if potential offenders know that they are being monitored, they will keep off committing an offence or a crime(Webster , 1995)....
5 Pages (1250 words) Essay

Biometric Technology in Singapore

This coursework called "Biometric Technology in Singapore" describes the relevance of using Biometric technologies in Singapore to collect, store and use this biometric information and personal particulars of its local residents and foreigners for security and other purposes.... This paper outlines its advantages and disadvantages and its use in different fields of life: economics, politics, security.... Consequently most governments have had to re-think their security strategies and allocate budgets to counter this potential threat of terrorism....
8 Pages (2000 words) Coursework

Privacy vs Protection of Assets, Issues of Biometric Technologies in Organizations

This essay "Privacy vs Protection of Assets, Issues of Biometric Technologies in Organizations" shows an outline of biometrics when all is said in done and portrays a percentage of the issues identified with biometrics vulnerabilities and security and the assurance of one's protection.... hellip; It is clear that one cannot overlook the events of September eleventh have impelled an expanded action of private and open enthusiasm toward security and particularly, biometrics....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us