Verified Document

Biometric Security In Both The Term Paper

It also helps to reduce the threat of identity theft as this is frequently initiated through the hacking of such highly vulnerable wireless communication devices. According to ThirdFactor, the same BioLock technology is currently being adapted to meet the needs of the Microsoft Windows and Mac OS packages on the market's near horizon. This suggests that the pacesetting consumer brands in the technology, software, cell phone and computing industries all view biometric security as one of the paths for innovation. This is underscored by a view both governmentally and commercially that online and cyber-security need to be major concerns for business, agencies and private citizens alike. That said, many of the cutting edge biometric technologies are still not impervious to the ingenuity of hackers and identity thieves. According to Rick Smith, a private researcher who has worked with the National Security Agency in testing its it vulnerabilities, hackers remain always one step ahead of commercial technology designers. Brandt (2002) states that every method of biometric security which is in circulation is susceptible to highly sophisticated forms of identity fraud. Here, Brandt reports, "Smith described several ways the most common types of biometric identification devices -- iris scanners, face and voice recognition systems, and thumbprint readers -- could be fooled. Biometrics, the science of identifying a person by reading their unique body features, have been much touted as a way to strengthen domestic security at places ranging from supermarkets to nuclear power stations. 'Biometrics aren't secrets, they're properties of your body that you slough off all day long, when you're eating lunch, or driving your car, or opening the door,' Smith said. As a result, each of us leaves a trail of biometric signatures everywhere we go, creating many chances for theft of biometric information." (Brandt, p. 1)

This is to suggest that a reliance...

As some prominent government commissioned research specialists have observed, these features are all in some manner permeable to artificial replication for unauthorized security clearance. It is thus that for many of the most sophisticated and sensitive of agencies, the emphasis is increasingly turning to DNA data as a more secure biometric indicator of identity and thus a more effective instrument in law enforcement, in intelligence gathering, in military information-gathering and in private security. Additionally, concerns over the balance between security and privacy must be assessed before any such firm or organization begins to employ a biometrics-based system for its own purposes. As the article by Silverman & Liu (2001) points out, "there is no one best biometric technology. Different applications require different biometrics. To select the right biometric for your situation, you will need to navigate through some complex vendor products and keep an eye on future developments in technology and standards." (p. 27)
This means that the various concerns over vulnerability, accountability and privacy must be factored into the decision as to whether or not biometric security features should be initiated and, consequently, as to how they may best be implemented.

Works Cited:

Brandt, a. (2002). Biometric Security Barely Skin-Deep. PC World.

Roberts, M.R. (2010). Ventura County Adopts Biometric-Based PC Security System. Fire Chief.com.

Silverman, M. & Liu, S. (2001). A Practical Guide to Biometric Security Technology. IEEExplore, 3(1), 27-32.

Technovelgy. (2010). Biometric Security Overview. Technovelgy.com.

ThirdFactor. (2010). Biometric security coming to Android. ThirdFactor.com.

Sources used in this document:
Works Cited:

Brandt, a. (2002). Biometric Security Barely Skin-Deep. PC World.

Roberts, M.R. (2010). Ventura County Adopts Biometric-Based PC Security System. Fire Chief.com.

Silverman, M. & Liu, S. (2001). A Practical Guide to Biometric Security Technology. IEEExplore, 3(1), 27-32.

Technovelgy. (2010). Biometric Security Overview. Technovelgy.com.
Cite this Document:
Copy Bibliography Citation

Related Documents

Biometric for Security
Words: 1493 Length: 5 Document Type: Dissertation

This was done by creating an artificial fingerprint from the little traces that are left on the biometric scanners. This entailed the process of obtaining the relevant biometric data. The second approach involved employment of a technique that is commonly referred to as deploying a replay attack. In this approach is equivalent to the man-in-the-middle attack that is common in various communication data breaches. The process involves the tapping

Biometric Optical Technology Retina Biometric
Words: 1338 Length: 5 Document Type: Term Paper

2) False acceptance which is through confusion of one user and another or the acceptance of an invalid individual as being a user that is legitimate. Although the rate of failure is easily adjusted through modifying the threshold through decreasing the rate of failure on the end of rejection or acceptance the increase of failure on the other end of the spectrum increases In the act of choosing equipment with biometric

Analyzing the Biometric Technology Phenomenon
Words: 2000 Length: 5 Document Type: Term Paper

Biometric Technology Biometrics are those easily measurable physiological, behavioral or anatomical characteristics, which can be used in identifying an individual. A common biometric modality is fingerprints, but there are others like DNA, voice patterns, irises, facial patterns, and palm prints. Biometrics have been quite beneficial in the last couple of years for law enforcement and intelligence (investigative) purposes, mostly to the FBI and its associates. in the intelligence and law enforcement

Security Plan the Maryland Public
Words: 2681 Length: 9 Document Type: Case Study

This is sensitive information that should be securely stored. The records contain confidential information that could be used in identity theft. The records should be securely stored either in soft copy or hard copy. Only authorized personnel should have access to these records. Audit trails should be installed to keep track of the personnel who access the records. The authorized personnel should be analyzed and background checks conducted. Strict

Biometric Safeguards and Risks Biometric Safeguarding Itakura
Words: 647 Length: 2 Document Type: Essay

Biometric Safeguards and Risks Biometric Safeguarding Itakura and Tsujii are proposing to allow an external organization, such as PKI, to issue biological certification as a way to ensure the validity of biological information. (Itkura, 2005) It would consist of three cryptographic keys; a public key and two secret keys. The public key would be defined as the representative template for personal biological information registration. The algorithm selects the representative template to be

Biometric Controls Biometric Cost Analysis There Are
Words: 735 Length: 2 Document Type: Essay

Biometric Controls Biometric Cost Analysis There are some questions that will help determine the cost benefit analysis of a new biometric system (Cooper). The level of security, the level of reliability, need of backup, the acceptable time for enrollment, level of privacy, and storage needed are things that need to be determined first. Will the system be attended or not? Does the system need to be resistant to spoofing? Will the system

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now