Identification Methods In a physical security system, there are a number of different ways to identify employees for the purpose of granting them different levels of access to parts of a facility. In many instances, a combination of methods will be used for maximum effectiveness. Passcards are usually one of the lowest levels of identification. They are easy...
Taking notes may not seem like much fun, especially in a world where a person can just Google whatever he or she wants to know. Still, note taking is very important, and there are ways to do it right. Some instructors will request that you take notes and turn them in, just to make...
Identification Methods In a physical security system, there are a number of different ways to identify employees for the purpose of granting them different levels of access to parts of a facility. In many instances, a combination of methods will be used for maximum effectiveness. Passcards are usually one of the lowest levels of identification. They are easy to create and implement, but they have a key weakness in that they are transferrable. As such, a passcard offers only the lowest level of security.
Because of this, security professionals look at things that are unique to an individual, but are not transferable. This typically involves some form of biometrics -- retina scans, iris texture scans, fingerprints, facial recognition, voice recognition or even the shape of your ear (Moren, 2014). Things like body shape and gait recognition have also been explored, as a means of identifying a person based on what are presumed to be unique traits (Boulgouris et al., 2005).
There have also been attempts to utilize things like handwriting analysis as a means of biometric analysis, based on analysis of texture (Zhu, Tan and Wang, 2000). Retina and fingerprint scans are among the more common biometric methodologies in use, however. Both are long-established technologies that are relatively cheap, and relatively foolproof. They are not entirely foolproof, however, which is why many companies prefer to utilize more than one method, such as combining a swipe card with a retina scan, or using multiple biometric methods.
There are concerns with these systems, however, as people might seek to gain access to the files containing critical biometric information, and find a way to replicate that information for input at an access point. Thus, even biometrics are posing a challenge for people involved in IT security. They are better than other methods, but not foolproof (de Chant, 2013). All told, most organizations are moving towards biometrics because they are effective.
The fact that fingerprints and facial recognition are in common use -- at borders, on electronic devices, has made the use of biometrics mainstream at this point, and companies are taking advantage of this to increase their use of such secure techniques. References Boulgouris, N., Hatzinakos, D. & Plataniotis, K. (2005). Gait recognition: A.
The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.
Always verify citation format against your institution's current style guide.