8 pages (2000 words)
, Download 2
...identification numbers, passwords, and keys as their hidden security to access confidential information and restricted files. However, these identification numbers, passwords, keys, and cards can be stolen, forgotten, lost, given away, or forged. Additionally, these devices mainly serve to identify the individual. They are not able to verify or confirm that the individual is who she or he claims to be. The information and technology age is rapidly revolutionizing the manner in which dealings are completed (Frischholz, Robert and Ulrich 65). Daily actions are progressively being electronically handled, rather... Biometric Identification For system administrators and internet users, security has become a...