Computer Technology - Biometrics Biometric Research Proposal

Unsophisticated biometric systems are already available at relatively affordable prices but they are unsuitable for many sensitive assets and applications. Sufficiently sophisticated biometrics systems to safeguard highly sensitive assets and information systems are comparatively cost prohibitive for small and medium-sized business entities (Mills & Byun, 2006). For example, fingerprint biometric identification systems are perfectly appropriate for low-level information systems and assets, particularly where those systems are used I conjunction with highly-trafficked areas that preclude extended private access. However, the same biometrics measures are insufficient in conjunction with low-traffic areas that permit potential intruders extended opportunities to work on bypassing the system without their efforts being observed or discovered. That is simply a function of the proven ability of forged fingerprints reproduced onto a synthetic film placed over the infiltrator's finger.

Ultimately, biometrics...

...

(2006). How Biometric Security Is Far From Foolproof: Systems' Holes Spur Efforts to Improve Limitations; the Gummy Bear Deception. The Wall Street Journal, December 21, 2006 (p. B 3).
Busch, C. (2006). EMBO Reports: Facing the Future of Biometrics. European Molecular Biology Organization, Vol. 7.

Hamilton, W. (2007). Will Biometric Authentication Solve Corporate Security Challenges? Optimize, Vol. 6, No. 2.

Larsen, R. (2007) Our Own Worst Enemy: Asking the Right Questions About Security to Protect You, Your Family, and America. New York: Grand Central Publishing.

Mills, J., Byun, S. (2006). Cybercrimes Against Consumers: Could Biometric Technology Be the Solution? IEEE Internet…

Sources Used in Documents:

References

Bulkeley, W. (2006). How Biometric Security Is Far From Foolproof: Systems' Holes Spur Efforts to Improve Limitations; the Gummy Bear Deception. The Wall Street Journal, December 21, 2006 (p. B 3).

Busch, C. (2006). EMBO Reports: Facing the Future of Biometrics. European Molecular Biology Organization, Vol. 7.

Hamilton, W. (2007). Will Biometric Authentication Solve Corporate Security Challenges? Optimize, Vol. 6, No. 2.

Larsen, R. (2007) Our Own Worst Enemy: Asking the Right Questions About Security to Protect You, Your Family, and America. New York: Grand Central Publishing.


Cite this Document:

"Computer Technology - Biometrics Biometric" (2008, December 04) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/computer-technology-biometrics-biometric-26164

"Computer Technology - Biometrics Biometric" 04 December 2008. Web.24 April. 2024. <
https://www.paperdue.com/essay/computer-technology-biometrics-biometric-26164>

"Computer Technology - Biometrics Biometric", 04 December 2008, Accessed.24 April. 2024,
https://www.paperdue.com/essay/computer-technology-biometrics-biometric-26164

Related Documents

This particular instance was significant as the attackers used a generic approach instead of a site specific or application specific exploitation by devising tools that used the web search engines to identify ASP applications that are vulnerable. SQL injection attack was used to propagate the malicious code that exploited zero day vulnerability in Microsoft Internet explorer last year. [Symantec, (2009 ) pg. (47)] the aim of the attackers employing

Computer Security Systems The report provides new security tools and techniques that computer and IT (Information Technology) professionals, network security specialists, individuals, corporate and public organizations can employ to enhance security of their computer and information systems. In the fast paced IT environment, new threats appear daily that make many organizations to lose data and information that worth billions of dollars. In essence, the computer and IT security professionals are required

Technology in Use in 1910 and the Technology in Use Today Technology during 1910 and its rapid evolution to the present era: The 19th century witnessed major upheavals in science and technology ushering a gamut of changes and widespread ripple effect on the society. The dawning of science in industry brought about by the Industrial Revolution was a watershed in global technology that continued to shape the future of mankind. It

computer related data on a forensic level. With new advances in technology, there are new opportunities for criminals to commit crimes online and through hacking into computer systems. These crimes committed are often very complex, and take special techniques in order to collect enough evidence to suggest a suspect or even the presence of a crime itself. The paper then goes on to discuss the sensitivity of electronic evidence

Computing networks are certainly changing. There are a couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the most part, these drivers are resulting in positive changes for computer networks. One of the fundamental ways in which computer networks are changing is that they are incorporating Virtual Private Networks (VPNs). VPNs provide an additional computing network inside of an external

" (2008) Williams finally state that dynamic computing can enable innovation through enabling it departments to shift "from a 'light on' operation to a proactive, forward-looking approach." (2008) SOCIAL CONTRACT The work of Edward M. Rizzo and Leslie a. Worsley entitled; "Emerging Technologies and the Internet Enable Today's E-Workforce" states that with the changes occurring in today's workforce "management requires a new way of thinking. The tools driving organizational effectiveness shave changed