A Survey of Advances in Biometric Security

Research Paper
Information Technology
Pages 10 (2510 words)
Download 0
The primary purpose of this particular research was to determine a thorough survey about the advancement of biometric solutions as security measures in numerous sectors over the years of its existence. Contextually, from the analysis of various secondary research articles and…


However, there are certain specific issues associated with the use of biometric security system within any network. These issues mainly involve violation of basic privacy rights of individuals during the process of identification and analysis along with errors of accurate identification in certain scenarios. Hence, it can be concluded that biometric solutions are indeed an important part of the modern day security control measures and will most definitely be more prominent in years to come.
With the advent of technology and its advancement, considerable changes have been noticed in terms of its application in various domains of the society (Pise, 2011). It has been comprehended that in the presence of advanced technologies, conducting any particular activity has become more easy and interesting. In this context, it can be stated that the use of technology is extensively apparent in almost each and every domain of the society which includes education, business, healthcare and security sector among others (Gates, 2011). The use of technology for the purpose of information security has also become quite prevalent in the recent time. There are numerous technologies that are implemented for the purpose of security control in the present day with biometric security being the most extensively implemented one. Biometric security primarily refers to the approach of analyzing or evaluating an individual with the purpose of examining their identification for accessing a secured areas or network with the help of biometric tools and techniques (Mordin & Tzovaras, 2012). Biometric security works on the principle of analyzing patterns and physiological and biological structure of individuals towards validating their identification (Cole, 2011).
This research intends to provide a comprehensive understanding about the aspect of biometric security solutions along with an evaluation of its performance efficacy in the present day context. Likewise, the research will be ...
Download paper
Not exactly what you need?

Related papers

State of Maryland Information Security Program Survey
The accomplishment of the objectives of the State of Maryland fits into the information security program, which recognizes the role of information systems in streamlining various processes. Analysis Strategic fit: There is a strong correlation between the information the security program of the State of Maryland and its goals and objectives. The following areas of security illustrate this…
3 pages (753 words)
Information Security Program Survey
As described in its website, VA is one of the world’s largest consolidated IT organizations and the department’s Office of Information Technology has a $3.1 billion budget for the current fiscal period. The organization operates nearly 800 community based outpatient clinics and 152 medical centers. In addition, it possesses over, 300,000 desktop computers, 30,000 laptop computers, and roughly…
5 pages (1255 words)
Information Security Program Survey
Since the NASA needs to manage highly sensitive data, information, strategic plans, and space programs, the organization pays particular attention to its information security program. This paper will analyze NASA’s information security program focusing on aspects like strategic fit, breadth and coverage, program deficiencies or implementation issues, and stated costs and benefits. NASA…
4 pages (1004 words)
Successful information security management
Security incident management facilitates the development of security incident handling and planning including preparation for detection and reply to information security issues. The standard of the incident management primarily relates to ensure the existence of processes rather than the contents of these procedures. The security incident of different computing systems will have dissimilar effects…
Survey on Security in Electronic Voting Systems
Due to this, the system provides uniqueness of votes ensuring that no voter can vote more than once. The receipt that the voter receives after casting a ballot cannot be used to prove to any third party that they cast a specific vote with the intention to coerce them. The system also allows for the verification of individual votes to assure the voters that their votes have been accurately…
8 pages (2008 words)
However, research has shown that the mismatched identification in a whispered speech is due to the phonemes hence providing an unvoiced consonant will prevent this mismatched in whispered identification. Key Words- Voice, Phoneme, Biometric Authentication I. RESEACH QUESTION/PROPOSAL A feature information of enrolled person’s biometric information in biometric authentication is normally enrolled…
4 pages (1004 words)