StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Physical Security - Essay Example

Cite this document
Summary
Recently the developers of systems for computer networks protection are more and more guided by the biometric systems. 'Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentification purposes'1…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.5% of users find it useful
Computer Physical Security
Read Text Preview

Extract of sample "Computer Physical Security"

Download file to see previous pages

Biometric characteristics are exclusively individual; therefore making such characteristics a basis of user identification provides high reliability of protection. So we may define a biometric system as 'a pattern recognition system which recognizes a user by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user'2. The tests made by the International Computer Security Association (ICSA) have allowed to issue certificates to rather limited number of systems of biometric identification.

It is necessary to notice that six products certificated by the ICSA have been selected as a result of the careful analysis from a plenty of models. In the manual 'Biometric Industry Product Guide' issued by the ICSA, there is a description of 170 systems, allowing to make identification of users on basis of their unique physical parameters. Many independent users, including representatives of the ICSA, appreciate certified systems at their true value. The majority of biometric systems operate in the following way: the digital mark of a fingerprint, an iris or a voice is stored in the system database.

A person, who is going to get access to a computer network, enters his/her own personal biometric information into the system by means of a microphone, a scanner of finger-prints or other devices. The received data are compared with the sample, which is kept in the database. Let us consider the mostly used biometric systems of computes access control. FINGERPRINT RECOGNITION Recently the dactyloscopy has attracted the attention as a biometric parameter, which quite possibly will become the most popular in the future.

Already now the application of this technology has received wide circulation in Automated Fingerprint Identification System (AFIS) used by police throughout all territory of the USA and more than in other 30 countries of the world. In the USA devices of access control based on fingerprint identification are established in military institution, including the Pentagon. Among the advantages of fingerprint scanners are simplicity, usability and reliability. Though the percent of erroneous negative identification is about 3 %, a mistake of positive access is less than one to one million.

All process of identification lasts no more than several seconds and does not demand any efforts from those, who use the given system of access. Nowadays such systems are made in the size of less than a pack of cards. The certain disadvantage constraining the development of the given method is the bias of a part of people, which do not wish to make the information on their fingerprints available. Thus the counterargument of developers of such equipment is the assurance that the information about papillate pattern of a finger is not stored.

What is stored is only short identification code constructed on the basis of prominent features of your finger-print. HAND GEOMETRY RECOGNITION The method of identification of users by hand geometry by it's the technological structure and the level of reliability is quite comparable to the method of ident

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Physical Security Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1512564-computer-physical-security
(Computer Physical Security Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/miscellaneous/1512564-computer-physical-security.
“Computer Physical Security Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1512564-computer-physical-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Physical Security

Issues in Email Hacking

The technology-savvy people can easily use the Internet to hack into the computer systems so that they can steal money, infect others' computers with viruses, and change the information in their private profiles.... The paper "Issues in Email Hacking" describes that as the world has become increasingly globalized and the societies have become smaller with the increase of technology, privacy has become all the more important because the threats to privacy have increased manifolds....
9 Pages (2250 words) Essay

Physical Security Related to Computer Systems

The paper is a discussion about the first layer of security called physical security.... An introduction has been given as to what does physical security means in general and in particular in terms of computer information systems.... physical security related to computer systems is particularly explained.... hellip; Proper monitoring of the physical security measures is very necessary to make the security perfect.... A list of physical security threats has been given which are very likely to occur with a technology-based system....
8 Pages (2000 words) Term Paper

Physical Security Clients Assessment (Criminal Justice)

physical security refers to the physical measures undertaken to safeguard personnel, protect material from unauthorized access and protect against theft, damage and sabotage (Fennelly, 2004).... The vulnerability of any security installation has to be assessed so as to determine physical security needs.... Reese and Tong (2010) point out the physical security of federal buildings and include assets of physical security such as closed-circuit television cameras, safety guards and barrier material....
5 Pages (1250 words) Essay

The Primary Objectives of Information Security

This coursework "The Primary Objectives of Information security" focuses on the objectives of the protection of information from a wide variety of threats, such as, getting accessed by unauthorized persons, disclosed, sold or destroyed, without the consent of the owner of the information.... nbsp;… Information security is becoming one of the most important concerns in almost every profession and every field of life.... Information security is a business issue, not just a technology issue....
6 Pages (1500 words) Coursework

Concepts of IT Security

This coursework "Concepts of IT security " describes an essential aspect that the company must deal with it seriously.... This paper outlines the legal measures to increase its system security and to create security training and awareness for its employees.... nbsp;… This paper is going to give an analysis of the security background carried out by Enigma security Services analyst about a particular company....
10 Pages (2500 words) Coursework

The Strategies Applied in Computer Security

Due to the compromising nature of the data, the most effective way to protect it involves undertaking careful technical measures, well trained staffs and physical security.... … Computer SecurityIntroductionSeveral businesses are required to allow authorized access from distinctive security domains.... This is simply because new data applications exists, which introduces very complex to data security administrators.... The Computer SecurityIntroductionSeveral businesses are required to allow authorized access from distinctive security domains....
8 Pages (2000 words) Assignment

Developing a Security Plan

… The paper "Developing a security Plan" is a wonderful example of a term paper on information technology.... nbsp;Information security is the safeguarding of information and information systems.... The paper "Developing a security Plan" is a wonderful example of a term paper on information technology.... nbsp;Information security is the safeguarding of information and information systems.... Thus, information security is necessary to prevent all this....
15 Pages (3750 words) Term Paper

Principles of Computer System Design: Security

… The paper "Principles of Сomputer System Design: security" is a wonderful example of a book report on design and technology.... The paper "Principles of Сomputer System Design: security" is a wonderful example of a book report on design and technology.... Malware such as Key loggers are difficult to evade, but using simple tricks and ways of obfuscating passwords are plausible intervention to the security problem Key loggers pose (Gawrock and International Conference Future of Trust in Computing, 2008)....
6 Pages (1500 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us