Biometric Security - Essay Example

Comments (1) Cite this document
Summary
These days the world community is experiencing a fierce security scare from a number of sources. Terror related incidents in different parts of the world; despite highest security alerts is a testimony to the wide reach of the terror tentacles. The incidents taking place in Iraq, Afghanistan and Pakistan are certainly not a good sign for the humanity as such…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Biometric Security
Read TextPreview

Extract of sample
"Biometric Security"

Download file to see previous pages While on the one hand the terror attacks are resulting in loss of human lives, the heightened security measures are also causing lot of inconvenience to the people whenever, they have to cross over a boundary, check-in at the airport, attend a ceremony, start a train journey etc. A debate has already started as to what extent the security agencies must be snooping into the lives of people, so that it doesn't amount to loss of privacy. While on the one hand the proponents of strict security measures say that it is all being done for the sake of the security of people, there are a number of others including many human rights activists countering this claim and asking the security agencies to have some restraint in snooping on the private moments of hapless citizens.
The debate is certainly on and promises to continue for many more years or till the world community continues to be divided on religious matters or border area disputes like at West Bank continue to flare up the emotions and people like Osama-Bin-Laden continue to elude the security agencies. While the IT enabled environment has given the security agencies the much needed advanced tools to keep track of anti-social elements, the flip side is such techniques are also being used by the organised crime groups to sustain their campaigns. Such developments point out the need for stricter surveillance. These days surveillance is carried out in different ways depending upon the requirements. While biometric surveillance help in beefing up security measures at airports, railway stations, important offices etc. measures like RF tagging is used to monitor the movement of goods, vehicles and the workforce. In some ways these measures result in loss of privacy for the common people. This study is an attempt to analyse some of the arguments for and against these measures, while taking a look at the prevailing circumstances and the advancements in technology.

Research Questions and Objectives
The study is primarily being undertaken to understand the concept of biometric security in general and the extent to which these measures have helped in strengthening the security around us. If the spate of the transnational crime and acts of terror in recent months is an indication, such security measures do not seem to have put a stop of such crime, but the routine life-style of common people certainly has come under increasing close observation from many quarters. The study will try to seek answers to the following key objectives.
To analyze the security scenario and how it has undergone changes in the last couple of years.
To find out the types of strategies adopted by the governments and security agencies to make the life of its citizens safe and secure.
How the security agencies are making use of Biometric methods to figure out the security threats at different places.
What types of problems common people feel as a result of heightened security measures and how the security agencies have started snooping on to the privacy of people
What impact does such measures have on the common people, workforce and diplomatic relations in general


Research Methodology
The methodology adopted in carrying out a research activity has the potential to affect the final outcome of the research. Depending upon the subject of research and the area of its impact the methodology is decided. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Biometric Security Essay Example | Topics and Well Written Essays - 3500 words”, n.d.)
Biometric Security Essay Example | Topics and Well Written Essays - 3500 words. Retrieved from https://studentshare.org/technology/1516508-biometric-security
(Biometric Security Essay Example | Topics and Well Written Essays - 3500 Words)
Biometric Security Essay Example | Topics and Well Written Essays - 3500 Words. https://studentshare.org/technology/1516508-biometric-security.
“Biometric Security Essay Example | Topics and Well Written Essays - 3500 Words”, n.d. https://studentshare.org/technology/1516508-biometric-security.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
es
esperanza35 added comment 6 months ago
Student rated this paper as
This essay was always my weak point. I could never complete it well. Still, after I found this precise essay, I understood how it should be completed. So, I performed my research afterward and completed the essay in several hours, instead of months as it was previously.
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Biometric Authentication
...is what is referred to as biometric authentication. The security of a nation is very sensitive and therefore military bases and locations of security valuables need to be under 24 hour surveillance to ensure that there is no breaching in the perimeter. Ministries of defense in various developed countries have therefore employed biometric authentication in their military bases to restrict access to only authorized personnel and not just anyone. This paper will be assessing biometric authentication in the context of Ministry of Defense and its necessities, alternatives, weaknesses and strengths among other pertinent issues. Why is a dedicated...
7 Pages(1750 words)Essay
Biometric Authentication
One’s fingerprint, hand, or face recognition senses such specific details as ridges, orientation, as well as other features of the fingerprint. DBS is thus an effective technology offering optimal solutions towards the safety of responsive areas, thereby meeting the demands of the clients for high security whilst maintaining litheness (Nanavati et al 2002). According to Jain et al (1996), a number of factors underscore the inevitability of a DBS. First, DBS requires that a recognition trait must be universal. This implies that all people must possess a chosen biometric, with each person having a distinctive one. Secondly, the chosen biometric, in every human being, must be stable. Role-based admission management is a fundame...
7 Pages(1750 words)Essay
Evaluate the claim that biometric technology is a viable and effective alternative to traditional security methods
...? BIOMETRIC TECHNOLOGIES VERSES TRADITIONAL SECURITY METHODS Introduction Companies strive to protect their assets, information, and offer means of access regulation to such vital information. Such a procedure needs identification and authentication to maintain right access of right information by authorized person. For years, traditional security strategies such as personal PINs and passwords have been in use but with various limitations. Currently swipe cards and personal identification numbers have been introduced for increased security. Because of various challenges associated with traditional security methods, a more recent technology – biometric security method has been introduced. Experts suggest that biometric technology... is the...
5 Pages(1250 words)Essay
Biometric
...consonant will prevent this mismatched in whispered identification. Key Words- Voice, Phoneme, Biometric Authentication I. RESEACH QUESTION/PROPOSAL A feature information of enrolled person’s biometric information in biometric authentication is normally enrolled as templates that are stored by secure databases and anti-tampered devices. However, the disadvantage is that biometric information is irrecoverable once compromised. Therefore, there is need to give such information special attention in order to ensure they are safely stored. Also due to increased internet penetration and access by many people has raised a need for the implementation of online...
4 Pages(1000 words)Research Paper
Biometric Security and Privacy
...Biometric Security and Privacy If we compare the technology of today to that of fifty years back, we'd find that the advancements have surpassed the expectations of even the science fiction writers. The kind of technology and networking that exists around us has certainly made life simpler for us. But, the extent to which it has made us safer is still being debated. While on the one hand we have advanced security gadgets, on the other the acts of sabotage too are being carried out in most sophisticated manner. Biometric technology is an effort to diagnose the problems and fill some of the loopholes in the security setup. As of now it is being said that...
15 Pages(3750 words)Essay
Biometric Security
...Running Head: Biometric Security Biometric Security As Utilized For Fingerprint Scanners, Smart Cards and Iris Recognition System Introduction In thespecialized field of security management, the primary concern of the manager is ensuring safety and protection of all the resources of the organization. The function entails detection of any kind of intrusion and initiating appropriate actions to ward off and prevent harm or damage to the organization, as a whole. As advances in technology have been development, facilities and features ensuring the safety and security of organizations have adapted to these technological developments. One of the products of this advancement is in the area of biometrics. “Biometrics is the science... and...
4 Pages(1000 words)Essay
Biometric System
...Biometric System The introduction of the Biometric system has taken new strides as we usher into the next decade. These cards are personal identity cards that provide for a personal identification tool, address proof and are linked to the National Identity Register in countries like the United Kingdom. Biometric technologies are defined as automated methods of identifying or authenticating the identity of a living person based on unique physiological or behavioural characteristics. When used in a well-designed system, such biometric technology can provide the means to ensure that an individual presenting a secure ID credential has the complete right to...
6 Pages(1500 words)Essay
Biometric Authentication
... of a physical character such as a fingerprint. This kind of authentication is what is referred to as biometric authentication. The security of a nation is very sensitive and therefore military bases and locations of security valuables need to be under 24 hour surveillance to ensure that there is no breaching in the perimeter. Ministries of defense in various developed countries have therefore employed biometric authentication in their military bases to restrict access to only authorized people and not just anyone. This paper will be assessing biometric authentication in the context of Ministry of Defense and its necessities, alternatives... is a ...
7 Pages(1750 words)Essay
A Survey of Advances in Biometric Security
...A Survey of Advances in Biometric Security The primary purpose of this particular research was to determine a thorough survey about the advancement of biometric solutions as security measures in numerous sectors over the years of its existence. Contextually, from the analysis of various secondary research articles and journals, it has also been learned that biometric solutions have a prominent presence in numerous domains of the society owing to its effectiveness as a security control measure. It is also seen to be one of the most updated forms of security control systems in the present day scenario. However, there are...
10 Pages(2500 words)Research Paper
Biometric Authentication
...Evaluation of the Viability of Biometric Authentication For Online Transactions Presented By: Computer Sciences and Information Technology Lecturer’s Name Institution’s Name Location Date 1. Viability of biometric authentication methods for online transactions Biometric Authentication is generally a more secure means of optimizing data security on online transaction as it minimizes the risk of impersonation and identity theft. In essence, biometric identification implies that the owners of the information are present in person as it identifies unique features such as eyesight, fingerprint, and voice data (Oezcan 2003, p. 11). Unlike password and signatures which are easily stolen by third parties, biometric authentication relies... ...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Biometric Security for FREE!
logo footer
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us