Biometric Security System

Great Essays
In today’s world, one of the greatest challenges being faced by individuals across a vast array of disciplines is protection and security. If we are to take a moment and reflect upon every instance during our everyday lives in which we use some sort of technology to access personal information or encounter something in which we are required to prove our identity, we can clearly see that there are numerous opportunities through the day in which our information is at risk. Therefore, it becomes very evident that we must find ways to protect not only this information but the channels through which we access it.
In the past, this concern has been widely addressed through the use of passwords, but as technology advances and thieves become more tech savvy vulnerabilities to secure information and facilities increase greatly and passwords simply don’t cut in today’s world. As a result of this innovators have introduced biometric recognition and verification technology in order to take on the great task of protecting the aforementioned items. This technology has greatly expanded over the last decade not just in terms of capabilities but also in the rate
…show more content…
There are many assumptions that exist implying that multi-biometrics present a great inconvenience to the user.the assumptions stem from the fact that in order to be enrolled in a system the user must subdue multitude of scans and stored a significant amount of biometric data in a repository. It is also no secret that this amount of information on a large number of individuals presents a very likely target for identity thieves thus creating additional privacy concerns for the users. The greatest downfall to these concerns and they are very rarely discussed in regards to today’s technology and they must be in order to improve user acceptance and expand multibiometric implementation. (Newman, Robert.

Related Documents

  • Improved Essays

    MIS101: Assignment

    • 559 Words
    • 3 Pages

    Of these retina and fingerprint scans appear to give the most definitive form of identification. o Something the user has is a form of authentication in which the person has regular identification…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Biometrics is the science of analyzing different biological data. A example of what you could be analyzing is DNA. Biometrics also involves the use of many different technology equipment. The article Biometrics: From Reel to Real by Dan Tynan talks indepth about all the different things that can be used to determine who you are. First they talk about how they use biometrics in everyday life, like at businesses and schools.…

    • 475 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Unlike many other biometrics, face recognition is a Passive process that doesn't need the user's cooperation; this characteristic makes the face recognition very valuable for the surveillance and crimes solution purposes. But there are some drawbacks with face first: the face features are not permanent, it changes over age. Second: It is not accurate for Identical twins.…

    • 294 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Response Essay Rewrite In recent times, Apple and the FBI have been arguing over the creation of software that would be able to reveal encrypted information. The author of the article Biting Apple Bruises Privacy Rights, argues the idea that by forcing Apple to hack their product will result in future violations of security and privacy. Personally, I strongly agree with the writer’s belief that forcing companies to reveal secured information is completely unwarranted and should not be allowed under any circumstance.…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Essay On Gun Safes

    • 501 Words
    • 3 Pages

    Gun safes have to be safe, and when you have kids in the house you can't take chances. Biometric firearm safes have lots of advantages when it comes to safety, in comparison to other sorts of safes. One of the most important benefits of a biometric weapon safe could be the control which you will get on who can gain access to your handguns. It is ordinary for a biometric gun safe to possess a memory of a minimum 20 separate fingerprints.…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    V-Care Security Solutions

    • 150 Words
    • 1 Pages

    V-Care Security Solutions We live in a society with a perceived threat from numerous sources. These threats are now a reality that faces us on a daily basis. We are put through metal detectors as we enter airports, multiplex or malls. Our society must be shielded from planned and random incidents that threaten to throw our fast pace of life out of gear.…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    Post 9/11 Privacy Prior the terrorist events that took place on September 11 (9/11), privacy was of minimal concern to most people. Of course they were concerned about identity theft and credit scores, but that paled in comparison to the fear that was generated by events on 9/11, which opened the gateway for new levels of privacy encroachments and examination that many are not comfortable with in their day-to-day lives. Ultimately, the argument comes down to whether people are for or against privacy loss in the wake of an ever-increasing terror threat. As Solove (2008) describes it in his article many individuals have chosen to accept an infringement on their privacy rights in order to be secure in the threat to terrorist activities.…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In the future, an all-in-one platform will be provided to the cops that will cater all the requirements of a cop. The policemen will be provided with a direct access to biometric data of the particular region so that concealing ones identity becomes nearly impossible for anyone. The already existing biometric data storage and identification process has many loop holes. It is predicted that in future this technology will be improved to higher levels ensuring personal privacy intact and precise levels of findings.…

    • 1028 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In the post 9/11 era “Smart Borders” has become a multi-faceted political, economic, and international endeavor balancing policy, to facilitate the safe and legal flow of goods and people through an array of technologies. After 9/11 extra attention was placed on cargo transportation systems, inspection technologies, and traffic management systems in an effort to ease congestion at the borders and extend inspections to include points of departure abroad (Andreas, 2009). Furthermore this emphasis was reinforced by the thirty points “smart border” declaration signed between Canada and the United States, and shortly after with Mexico (Andreas, 2009). The concept behind smart borders was to create a layer approach to border controls and cross…

    • 664 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Identity theft is any unauthorized use of someone else’s personal identity to fraudulently obtain money, goods, or services; to prevent the payment of debt; or to avoid criminal prosecution. In 1998, under the authority of the Identity Theft and Assumption Deterrence Act, identity theft became a federal crime with prescribed prison sentences for using identity theft to commit crimes. In addition, increased penalties apply for those who exceed, misuse, or abuse privileged access to personal identification records because of a position of authority. Identity thieves often use simple techniques to acquire personal information, such as Dumpster diving, plundering trash bags, and stealing mail from mailboxes to obtain paper records with identifying…

    • 467 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Digital technology has opened many holes in which the government can peak into peoples’ lives. It has blurred the line between what is considered public and private information. These technologies come in many forms such as, facial recognition technology, GPS tracking devices, drones, surveillance cameras, and devices used by the NSA to collect information. These technologies are abused everyday by authorities and government officials, and it is time to set limitations on how they use them. Facial recognition technology lies in more places than people may think.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Desktop Research

    • 811 Words
    • 4 Pages

    Keeping the personal records and fingerprint make sense as it will help to control alcohol related violence inside the pubs and clubs. On the other hand it raises privacy issue as there are chances for personal information leaking. Customers should be informed about the information they are keeping as well as the purpose of that. No information should be stored without letting the customers know about the content and purpose.…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays