This article discusses different types of biometric systems and privacy enhancing technologies in IT risk management. It explains the techniques, advantages, disadvantages, and applications of biometric systems like fingerprint, hand geometry, and iris recognition. It also explores communication anonymizers, enhanced privacy ID, and digital rights management in privacy enhancing technologies. The article provides insights into wireless sensor networks, their architecture, protocol stack, areas, and types of threats and vulnerabilities. It concludes with recommendations for mitigating the threats.