Research Proposal Undergraduate 502 words Human Written

Biometrics and How it Pertains to IT Security

Last reviewed: ~3 min read Other › Biometric
80% visible
Read full paper →
Paper Overview

¶ … Biometrics Relates to IT Security Enterprises are more reliant on their information assets and computer systems than factory machinery or production equipment. Ironically these fixed assets of companies are protected more effectively than the main IT systems of a business. While there are a myriad of security technologies available today,...

Writing Guide
How to Write a Literature Review with Examples

Writing a literature review is a necessary and important step in academic research. You’ll likely write a lit review for your Master’s Thesis and most definitely for your Doctoral Dissertation. It’s something that lets you show your knowledge of the topic. It’s also a way...

Related Writing Guide

Read full writing guide

Related Writing Guides

Read Full Writing Guide

Full Paper Example 502 words · 80% shown · Sign up to read all

¶ … Biometrics Relates to IT Security Enterprises are more reliant on their information assets and computer systems than factory machinery or production equipment. Ironically these fixed assets of companies are protected more effectively than the main IT systems of a business. While there are a myriad of security technologies available today, biometrics shows the most potential for creating and sustaining a unified, enterprise wide security for a company's IT and information assets better than any other (Crosbie, 2005).

The intent of this research design and methodology is to define the financial and operational benefits of biometrics being used as an integral component of an enterprise IT security strategy. Biometric Components and their Implications Implementing an enterprise-wide biometric system requires a model-centric approach over using a process-based approach to securing IT systems, information and the knowledge they deliver. Model-based biometrics are more secure and scale beyond the limits of traditional IT technologies as these latter approaches rely on a role-based authentication alone (Wang, Liu, Shyu, 2013).

Using a model-based authentication approach that is based on IT professionals' biometrics, an added dimension is provided to role assignments where each member of a team can be assigned access to a specific asset or series of reports (Wang, Liu, Shyu, 2013). The model-based approach to creating and sustaining a biometrics-based security strategy is predicated on seven different attributes that are reflected in the design objectives of companies building these systems (Crosbie, 2005). These attributes include universality, uniqueness, permanence, measurability, performance, acceptability and circumvention (Matyas, Stapleton, 2000).

The emergence of standards in this area is designed to unify these attributes into a scalable, secure framework yet also pertain the agility and time-to-market that is essential for enterprises to make these attributes relevant to their needs (Wang, Liu, Shyu, 2013). Today there is no clear quantifications of the financial and operational performance metrics for biometrics across all seven attributes. Research Objectives and Hypotheses 1. To determine the financial and operational performance measures of performance that biometrics is delivering to enterprises who have standardized on this technology today. 2.

To determine how the seven attributes that form the foundation of biometric theory can be organized into a standard definition hat abides by the existing industry frameworks. Research Technique The research technique will be based on a thorough literature review of all peer revised empirical research generated over the last 12 months. This time constraint is essential as.

101 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
4 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Biometrics And How It Pertains To IT Security" (2014, November 29) Retrieved April 22, 2026, from
https://www.paperdue.com/essay/biometrics-and-how-it-pertains-to-it-security-2153016

Always verify citation format against your institution's current style guide.

80% of this paper shown 101 words remaining