StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometric Identification - Essay Example

Cite this document
Summary
From the paper "Biometric Identification" it is clear that the ethical consideration of biometric technology is questionable particularly on security. Most of the problems such as violation of individual rights, proper protection of the biometric database have tainted the good intention of biometrics…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Biometric Identification
Read Text Preview

Extract of sample "Biometric Identification"

Biometric Identification For system administrators and internet users, security has become a primary concern. Whether one needs to protect private information and data in one’s file, to lock to unauthorized users, a computer system, individuals need to get a suitable level of security (Prabhakar et al. 34).This appropriate security is also required to regulate access to an extranet or an intranet, or to transact business through the internet. Determining effective means of realizing this proper security is also important. The fear of internet security has been one of the major barriers to transacting businesses electronically through the internet as a medium (Prabhakar et al. 36). With the contemporary popularity as well as prospective profits of conducting transactions electronically, many organization executives experience a conflict situation. In other words, online connections to expand their sales are likely to lead to threats and risks of intrusion. Alternatively, staying disconnected from this very internet will bind them to sacrifice their client contact as well as services to their existing competitors. In order to transact most business dealings, and to convey electronic mail, the internet makes use of mail transfer protocol (Jain et al. 92). These transmissions possess as much confidentiality as a postcard. In other words, it travels over untrusted and insecure lines. This implies that anybody who is at any point along the path of transmission can access the message and hence read its content using the word processing program or text viewer. Also, since these transmission lines are not secure, forging e-mail or using the name of another person is easy. This has made theft of identity one of the leading fraud incidences. An individual can claim that another person sent a message, for instance, to terminate an order or evade paying an invoice. Both in the private and in the public sectors, organizations are cognizant of the needs and importance of internet security (Jain et al. 93). Both sectors, therefore, have led to measures that safeguard their internet data and business systems. However, the most appropriate way to prevent an intruder from accessing the network is by providing a security wall in between the corporate network and the intruder. Since these intruders accesses the system by the use of a software program, like a virus, or through a direct connection, user authentication, data encryption, and firewalls can somewhat prevent these intruders who intend to hack such networks. The first step to beefing up internet security is to regulate physical access by restricting to accredited individuals only (Frischholz, Robert and Ulrich 64). The belief is that the smaller the number of people authorized to get administrative and physical access to the server systems or confidential files, the higher the level of security. A number of applications rely on individual identification numbers, passwords, and keys as their hidden security to access confidential information and restricted files. However, these identification numbers, passwords, keys, and cards can be stolen, forgotten, lost, given away, or forged. Additionally, these devices mainly serve to identify the individual. They are not able to verify or confirm that the individual is who she or he claims to be. The information and technology age is rapidly revolutionizing the manner in which dealings are completed (Frischholz, Robert and Ulrich 65). Daily actions are progressively being electronically handled, rather than being handled face to face or with paper and pencil. This progress and development in the electronic transaction has led to a greater demand for accurate and fast user proof of identity and authentication. A way of achieving this rapid, user–friendly, and distinct identity and verification is using biometric technology. The previous decade has experienced dramatic advancements in business activities (Ratha 615). As a result, there has been a dramatic increase in the number of corporations that store and also access sensitive and critical business data electronically over the internet or on computer networks. Therefore, the need for internet security has become a fundamental aspect since there is an increase in the level of threat of electronic crimes. Much as the international community has gained several benefits from applying new computer technologies. These have all together, made the online community more susceptible to frauds in the transfer of electronic information (Ratha 616). For decades, biometrics has been used in military and government applications that require a high level of security. However, currently, the biometrics technology is increasingly becoming affordable and is, hence, being used as a method of network authentication and overall safety feature. Biometrics can be described as the authentication technique that depends on physical or behavioral characteristics that can be verified by users of computers, making it easier to track people. Automated Biometrics has lasted for over thirty years now (Prabhakar et al. 37). Noticeably, matching fingerprints alongside criminal records is useful for the enforcers of law since it helps them to find the criminals quickly. However, the manual procedure of matching these aspects is extremely tedious and also time-consuming. Methods of internet security can team up within a network system in many ways. The standard technologies of internet security like remote access service and firewall together with biometrics user identification can be used to safeguard against the intrusion of data both from within and outside (Prabhakar et al. 38). If one attempts to access such a server with a combination of biometrics without authorization, the Intrusion Detection System (IDS) will inform or alert the informational technology staff about that entry. This notification is made even if the user may possess the appropriate biometrics user authentication. Also, since the IDS makes use of both dynamic and static monitoring systems to observe direct attacks as well as unusual network accesses, the user enjoys a double protection from possible harm. All through the system, data encryption is used (Jain et al. 95). As a result, users who call in from a telephone network that is switched, to a Remote Access Server found on the Windows NT network, are able to use the data encryption through point to point protocol of tunneling, to give and receive data and information. This information is changed either from home computer or laptops to the internet via the business network and vice versa. If a user links to the network via a RAS server, same access right is given to the user just like any other person who uses the system. Also, it is possible for the internet user to link to the RAS server and transfer encrypted data to the next server or another computer via Point to point Tunneling Protocol, PPTP (Jain et al. 96). Moreover, the RAS is equipped with its safety net, like user callback that is strictly for a particular phone number to find a connection, as well as user identification, user permissions, , and encrypted passwords. Biometrics offers greater security to financial assets and personal data, which are more essential. They can better protect most vital data, which could bring the most significant harm if reached by a wrong person (Jain et al. 97). An example of the most excellent possible applications is the use of biometrics to access ATMs. It can also be used with debit or credit cards as well as, as an overall use for fighting credit card deception. Several types of monetary transactions are also possible applications. These include banking by internet or phone, and selling and buying securities by internet or by phone. In the United States, many states have managed to save considerable amounts of money through the implementation of biometric authentication procedures (Janbandhu, Pawan and Mohammed 206). In the process, the numbers of profits claims have dramatically dropped. This has, therefore, validated the system as one of the most effective preventive agents against several claims. With merely home address, bank account number, or driving license number, criminals can use the internet to access all forms of personal information they may need in an individual. For this reason, in some United States prisons, inmates and visitors are subjected to verification processes to ensure that identities are not changed during such visits (Janbandhu, Pawan and Mohammed 207). Moreover, criminals can get the necessary information needed to receive new credit cards that are issued in a person’s name. Also, they can print counterfeit checks in another person’s name, acquire bank loans in other people’s names, and commit other creative tricks in the names of other people to gain at their expense. Such scam can cause severe damage by the time the person realizes what has happened. Identity theft victims usually spend fortune amounts of dollars and several years clearing their credit reports and names. Executing systems of payment processing that use biometrics in private account management is a significant step in preventing credit card fraud (Frischholz, Robert and Ulrich 67). Biometrics can be integrated at the time of sale, hence enabling customers to register their payment options like checking debit, credit, and loyalty into a safe electronic account, which is safeguarded by, and accessed using a unique feature like a fingerprint. In this case, cheques, cash, and cards are not required to make purchases. Therefore, it becomes needless to carry them around. By not carrying a wallet or a purse, chances of them getting lost or being stolen are eliminated. This system of transactional processing enables consumers, to quickly and securely control point-of- sale fee (Frischholz, Robert and Ulrich 68). This solution is mainly well suitable for individual check use. In addition, biometrics can provide increased security for check-cashing facilities, whether payroll or personal. By necessitating biometric identity authentication before a test is allowed to be cashed, the chances of it being offered by another person other than the anticipated payee is reduced. Ethics is one of the virtues that every organization, individual, and systems are expected to uphold at all cost. This is because it protects human dignity, the right to privacy, and confidentiality (Ratha 618). Recently biometric is one of the embraced fields that requires a lot of ethics concerning identification and authentication. The biometric technology has received various responses from the people. Moreover, not everybody would like to have their movements watched and controlled with the aid of a biometrics system. Thus, privacy life of individual persons, and the attention raises the question of ethics and biometric. One primary concern has been about who owns the stored biometric data. Presently, some people perceive biometrics technology as offensive and attacking their human dignity, rights, and even space (Ratha 619). Occasionally, people feel untrustworthy, embarrassed and dehumanized. Consequently, people feel threatened by any fraud, and identity threat including having data about themselves accessed, and misused by other people. For instance, there is the use of false biometric data like face image, fingerprints, and retinal scans that take the input device. This implies that the intended use of biometrics is questionable regarding privacy and attention. According to the theory of consequentialism which states that a morally right conduct should result in a real thing, some of the biometric devices have achieved limited competence to identify a particular person with technical accuracy, reliability, and foolproof indeed. This means that the end does not justify the means. Ethical egoism postulates that actions may be helpful, detrimental, or rather neutral to the wellbeing of others (Janbandhu, Pawan and Mohammed 209). This implies that the actions people frequently undertake have consequence. For instance, the point of weakness in a biometric procedure occurs during the enrollment course. A subject may have the opportunity to form a new identity for the presentation of fake documents during the registration processes. Once there is acceptance of a new false identity, and an imposter can use the services illegally. Furthermore when biometric databases fail to interconnect, it becomes easy for one to steal a real identity through the presentation of another person’s particulars during the enrollment course (Janbandhu, Pawan and Mohammed 210). This implies that the biometric data becomes unethical since hackers may use them for their benefit. A biometric character is mostly connected to the person’s intrinsic physical condition (Janbandhu, Pawan and Mohammed 211). .For instance, a person with deteriorated fingerprint possesses fingerprints with little biometric character. This implies that the biometric data carries fall information thereby losing morality and, standards. Mature standards ascertain that users adhere to general authentication protocols. Biometric technology may experience challenges including loss of a biometric file as opposed to a password that can be easily replaced (Janbandhu, Pawan, and Mohammed212). The stolen biometric data may be somehow invalidated. Also, biometrics is exclusively used for surveillance purposes. In this case, face recognition surveillance can be used to enhance security and also to monitor stubborn criminals Faces can be obtained from social websites, malls, and sporting event and used for unrelated security purposes without the individuals consent shows disregard of the people’s right to privacy. The problem comes in when there is mistaken identity. The victim will lose human dignity. Thus, the real intention of biometrics data is lost. In conclusion, it is a clearly recognized fact that the customary security measures like identification cards and passwords cannot sufficiently satisfy all forms of security requirements. As a result, Biometric is presently and continuously used for identification and authentication purposes in information systems (Frischholz, Robert and Ulrich 67). Several behavioral and physiological biometrics for the identification of individuals have wider applications like regulation of access to private files and personal computers. As the technology of biometrics becomes more conventional, the creation of applications leads to more phases of people’s daily activities. This is because the rising interest in integrating traditional technologies of internet security with biometrics has a potential to increase internet security in the future. However, the ethical consideration of biometric technology is questionable particularly on security. Most of the problems such as violation of individual rights, proper protection of biometric database, personal liberty, and confidentiality have tainted the good intention of biometrics (Frischholz, Robert and Ulrich 69). In order to overcome biometric data identification ethical problems, stored biometric databases should be protected. In addition, there should be avoidance of unauthorized collection, utilization, and retention of the biometric information. Also, the ethical matters surrounding biometrics technologies have to be weighed against potential benefits. The governments should, therefore, enhance the usage of the biometric system to mitigate the issues as mentioned above. Works Cited Frischholz, Robert W., and Ulrich Dieckmann. "BiolD: a multimodal biometric identification system." Computer 33.2 (2000): 64-68. Jain, Anil, Lin Hong, and SharathPankanti. "Biometric identification." Communications of the ACM 43.2 (2000): 90-98. Janbandhu, Pawan Kumar, and Mohammed YakoobSiyal. "Novel biometric digital signatures for Internet-based applications." Information Management & Computer Security 9.5 (2001): 205-212. Prabhakar, Salil, SharathPankanti, and Anil K. Jain. "Biometric recognition: Security and privacy concerns." IEEE Security & Privacy 1.2 (2003): 33-42. Ratha, Nalini K., Jonathan H. Connell, and Ruud M. Bolle. "Enhancing security and privacy in biometrics-based authentication systems." IBM systems Journal 40.3 (2001): 614-634. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Biometric identification Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Biometric identification Essay Example | Topics and Well Written Essays - 2000 words. Retrieved from https://studentshare.org/information-technology/1690661-biometric-identification
(Biometric Identification Essay Example | Topics and Well Written Essays - 2000 Words)
Biometric Identification Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/1690661-biometric-identification.
“Biometric Identification Essay Example | Topics and Well Written Essays - 2000 Words”, n.d. https://studentshare.org/information-technology/1690661-biometric-identification.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometric Identification

Importance of the Stress Test

Biometric Identification system and encryption techniques can be implemented to minimize database security.... System Failure Alternate system to replace the affected system Theft Lock Cabinets IP cameras, biometric fingerprint identification, Vandalism Hard steel box for Servers and Databases Flood Relocating or replicating the network room Create a duplicate or replica of crucial data servers that are geographically located away Fire water sprinklers, Fire extinguishers Earthquake Relocating data with data centers that are geographically located away Determining the Amount The initial step is to identity the information assets on the network along with the services associated with it....
3 Pages (750 words) Research Paper

Smart Perimeter Mapping

Introduction Smart perimeter mapping basically utilizes a combination of electronic equipment and technology such as closed circuit TV, Biometric Identification, and sensors to keep track of movement of inmates in and around the entire prison area (Bulman, 2008).... With some of the systems, the prisoners have their Biometric Identification including their fingerprints, the electronic identification of their eyes and other unique identification features to monitor the movement of inmates....
4 Pages (1000 words) Assignment

1.What is a false reject rate What is a false accept rate How are they related to the crossover error rate

There are various types of Biometric Identification.... It is the degree of probability that the biometric system will incorrectly reject the False Reject Rate False Reject Rate Biometrics, also referred to as biometric authentication, is the study through which human identity is recognized by its traits and characteristics.... It is the degree of probability that the biometric system will incorrectly reject the access of an authorized person....
1 Pages (250 words) Essay

SLP- Information Sensitivity and Protection of Data

Finally, there is a special Biometric Identification and coding system that identifies patients and people whose information is stored on the system rather than the use of actual names of patients.... This means that a lot have been achieved since the half mark has been crossed but there still remains a lot to be done....
2 Pages (500 words) Essay

Biometric Identification and Privacy Implications

Because of this, Biometric Identification serves as a powerful way to differentiate… Some of the advantages of Biometric Identification are that it can be rapidly deployed as a function of identifying and credentialing a large number of individuals within a Essentially, each individual human has unique biometric identifiers.... Because of this, Biometric Identification serves as a powerful way to differentiate one individual from another; based upon their own unique anatomical construction and biological exhibition....
1 Pages (250 words) Essay

Biometric Authentication

In essence, Biometric Identification implies that the owners of the information are present in person as it… 11).... In essence, Biometric Identification implies that the owners of the information are present in person as it identifies unique features such as eyesight, fingerprint, and voice data (Oezcan 2003, p.... Hong, L & Pankanti, S 2000, ‘Biometric Identification'.... The desirable processes of biometric authentication methods that make it reliable include verification, screening and identification....
2 Pages (500 words) Essay

IT Tools that Support Team Process

All these three tools can also be used with Biometric Identification programs, in order to facilitate and enhance this people identification process.... Data analysis using such tools as affinity and hierarchy diagrams may also be applicable for Biometric Identification purposes.... The "IT Tools that Support Team Process" paper argues that the use of IT team processing tools not only enable better coordination among different members of a team, it also ensures that such identification processes are carried with great savings in time and costs....
7 Pages (1750 words) Term Paper

What Will Provide the Best Input Control - EAC System or Biometrics

This entry can be authenticated by numerous means which can be done through biometric check, smart card, keypad entry and smart badge that have the proximity admission technology.... The paper “What Will Provide the Best Input Control – EAC System or Biometrics?... rdquo; provides peculiarities of the systems (EAC is security gear while biometrics is an authentication process) and emphasizes that company should undergo an evaluation process to identify the claims to introduce EAC....
14 Pages (3500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us