logo

ISY10212 Contemporary Issues in MM & IT

9 Pages2974 Words129 Views
   

ISY10212 Contemporary Issues in MM & IT (ISY10212)

   

Added on  2019-11-12

ISY10212 Contemporary Issues in MM & IT

   

ISY10212 Contemporary Issues in MM & IT (ISY10212)

   Added on 2019-11-12

ShareRelated Documents
Table of ContentsIntroduction..............................................................................................................................................................1Security Applications for Biometrics..............................................................................................................1Facial Recognition..................................................................................................................................................2Confidentiality and Greater Consumer Confidence..................................................................................2Ethical Considerations – Biometrics...............................................................................................................3Strength and weaknesses of finger prints and face recognition..........................................................3Geo tracking – a study in time and space.................................................................................................3Advantages in Business.................................................................................................................................4Importance and Relevancy............................................................................................................................4Conclusion..................................................................................................................................................................5
ISY10212 Contemporary Issues in MM & IT_1
IntroductionSafety and security has become an issue of great importance around the world, and technologicalsolutions to the issue are becoming extremely valuable for business, the government and theconsumer. Biometrics is a possible solution to safety and security and offers a wide range ofapplications in a wide range of fields. Biometrics is for the realistic authentication which is foridentifying the individuals in groups that are under the surveillance.However, there are severalethical issues of the implementation and management of this technology due to the sensitive andvulnerable data and information that it protects. This report starts by exploring the applicants ofbiometrics in a variety of fields and then moves on to evaluate its strengths and weaknesses.Considerations are also make about the ethical implications of the technology. Security Applications for Biometrics The concept of biometric and associated devices is based on calculation of a distinct biologicalfeature of an individual like a person’s voice-based patterns and the iris or retina of the eye orsometimes finger prints. This method of personal identification is superior because it offers ahigh degree of accuracy as it is based on biological identification. Biometrics is thereforeapplicable to a wide range of security measures useful to prevent intruders or criminals who maywant to access systems or sensitive information (Jones et al., 2014). The concept of facescanning along with biometric technology is versatile in so many ways and this can be seenranges of so many prospective applications.Given the higher degree of accuracy inherent in biological identification, there are many positiveapplications, particularly in terms of security. Security system uses a device which plays animportant part in verifying the identity of an individual by focusing on the overall access basedcontrol procedures. The concept of fingerprint recognition as one method of Biometrics, forinstance, looks for the distinct kind of pattern of valleys that is present in the finger print of anindividual. The patterns are distinct to every person and therefore also help to recognize peoplefrom a large database of other fingerprints. The print of finger is inherent to a person can neverbe stolen or lost which further make it right and trusted. (Bowyer et al., 2016). In addition, thepresence of less costly fingerprints readers is combined with easy level of integration andcapacities that lead to wide open deployment of biometrics in different companies (Zhang et al.,1
ISY10212 Contemporary Issues in MM & IT_2
2013). The concept of verification and identification are two methods which an identity relatesto decide the usage of biometric technology, and therefore provide justification for isimplementation in many fields which require high-level security.Verification helps in conforming that an individual surely claims to be and conduct comparisonon one to one level of the fingerprint sample of an individual to safe template for reference.There is process of identification also conducts the people sample for fingerprint which iscompletely against the entire templates stored. Facial RecognitionThe concepts of face biometrics have the prospective that can be combinedat any place and findan advance technology camera (Yates, 2017). There are number of law agencies as wellenforcing law son the world over the usage of overuse biometric software to scan the faces withthe help of CCTV footage along with recognizing the interest of field. There is different kind ofdeployment as part face recognition process to test the identities of number travelers (Huerta etal., 2016). Facial recognition is making a lot of difference with so many kinds of hardidentifications however; it also has the capacity to collect demographic kind of data for thecrowd. This further has made this technology sorted for the retail based marketing industry. Confidentiality and Greater Consumer Confidence The main motive of this concept is to save the overall confidentiality of present digital based datawhich is stored on diverse computer systems or sometimes get transmission through internet orsimilar networks. The modern time encryption and related algorithms also plays an importantrole in assuring the security of the present IT system along with communication since it helps inproviding confidentiality (Middleton et al., 2013). At the time of arrival of important exchangeand algorithms in RSA, the present government and the associated armies were just the userrelated with encryption. But RSA further led to broader use of the concept in the commercial aswell as consumer realms to save the data at the time it is sent across the network as well as storedlike hard drive or flash drive. Other devices like modem, smartcards or SIM uses encryption todepend on the protocols like the concept of SSH or SSL to encrypt the confidential data(Schneider et al., 2014). The concept of encryption is also utilized to save data in transit and sendfrom every part of devices across every kind of network. But we need to focus on some issues as2
ISY10212 Contemporary Issues in MM & IT_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Evolution of Biometrics | Capitol Technology
|5
|707
|22

The Assignment on Evaluating Biometrics in Security
|9
|1957
|23

Information Technology Assignment | Biometric Authentication Report
|10
|2249
|99

Research on Types of Biometric Systems
|12
|2874
|127

(Solved) Biometric Technology: PDF
|4
|767
|21

Biometrics for Authentication: Assignment
|10
|2172
|41