Network and Information Security : Assignment

Added on - 05 Oct 2020

  • 7

    pages

  • 1658

    words

  • 16

    views

  • 0

    downloads

Showing pages 1 to 3 of 7 pages
Network and InformationSecurity
Table of ContentsTable of Contents.............................................................................................................................2INTRODUCTION...........................................................................................................................1MAIN BODY..................................................................................................................................1Biometric Data.............................................................................................................................1Types of Biometric Data..............................................................................................................1Reliability of Biometric Security.................................................................................................3Risk of Technology......................................................................................................................4How to Secure biometric Method................................................................................................4CONCLUSION................................................................................................................................4REFERENCES................................................................................................................................5
INTRODUCTIONBiometric is the authentication of behavioural or physical information or characteristicsthat can be used for digital identity of person to get access to any system, data or device. Thedifferent type of biometric identities is facial pattern, voice characteristics, fingerprint and retina.Biometric security devices are used to provide access to particular person using their uniquetraits (Lu, Y. and et. al., 2015). The information collected from this body parts or behaviouralcharacteristics are unique for every person. This study presents the survey of biometric security.Recent development in information security is consists of different areas and study is explaininguse of biometric technology in information security. The methods used to secure informationthrough biometric security are explained in report.MAIN BODYBiometric DataThe biometric data of a person is the unique quality of person is pattern. The pattern anduniqueness of this data can be used in different devices to provide access to particular device,data and system. This is one of the most effective and suitable method for data security. Somesystem which are confidential and needs high protection can be secured using this technology.Through this method the access can be provided to authorised person by using their uniqueidentification attributes. The information can be only access by the person whose biometric dataadded to the security system. The accuracy and precision of security can be improved by usingmultiple type of biometric data. For example an important information is stored in a vault and thekey to open vault is biometric data of particular person. This vault can be only opened by thatperson. This how the confidential data or information can be secured by biometric technology byproviding authority to limited people (Choi, Lee and Yoon, 2016). The most important thingabout the biometric data is it can't be stole by anyone because the biometric data is attached tohuman body.Types of Biometric DataThe different type of information of particular person which can be used as biometric data are-fingerprint, photo and video, physiological recognition, voice recognition signature, DNA,physical movement, navigation pattern and engagement. This all kind of information can be usedas biometric data. There are two type of informationFingerprint-1
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document