StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

FingerID: A new Security Model on Distributed System By using Finger Print - Essay Example

Cite this document
Summary
Users tend to maintain several online accounts at the same time but do not take extensive measures to keep them secure. The authentication mechanism on the web is based on the conventional mode of…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
FingerID: A new Security Model on Distributed System By using Finger Print
Read Text Preview

Extract of sample "FingerID: A new Security Model on Distributed System By using Finger Print"

Download file to see previous pages

This application will provide convenience and reliability. The conventional modes of authentication of username-password do not seem sufficient and prove to be very simple for smart intruders. The general method of keeping easy passwords, sharing them with others etc [1], [2], [8] cannot prevail without having the user’s security being compromised. A solution for this could be to have long passwords [3] but this is not very practical. The need was to break the relation between the length of the password and the need for the user to remember it [91], [92].

Therefore a security mechanism was devised by researchers that would be practical for humans and yet prove to be very effective. Such a security technology which is gaining name is the biometric technology. Humans have unique characteristics in the form of physical features for example; eye color, fingerprint, palm prints etc. William stated that biometric recognition is such a system that is dependant on the unique humane characteristics such as DNA, voice, fingerprints, facial images etc [4], [70].

It authenticates the individual on the basis of these biometric therefore there is no need to remember long passwords for improved security. Fingerprint recognition systems are among the most frequently deployed biometric systems, due to their correctness, size, cost, performance and proven track record [5], [6], [7]. The research is focused at proposing a solution to enhance convenience in the logging process of online accounts. The research will address the factors that are needed to ensure security in distributed systems.

The proposed solution is coupled with the authentication process from only one biometric i.e. fingerprints. Users tend to maintain different credentials at different online services. According to a survey carried out for this research, it was found out that around 45%

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“FingerID: A new Security Model on Distributed System By using Finger Essay”, n.d.)
FingerID: A new Security Model on Distributed System By using Finger Essay. Retrieved from https://studentshare.org/miscellaneous/1566955-fingerid-a-new-security-model-on-distributed-system-by-using-finger-print
(FingerID: A New Security Model on Distributed System By Using Finger Essay)
FingerID: A New Security Model on Distributed System By Using Finger Essay. https://studentshare.org/miscellaneous/1566955-fingerid-a-new-security-model-on-distributed-system-by-using-finger-print.
“FingerID: A New Security Model on Distributed System By Using Finger Essay”, n.d. https://studentshare.org/miscellaneous/1566955-fingerid-a-new-security-model-on-distributed-system-by-using-finger-print.
  • Cited: 0 times

CHECK THESE SAMPLES OF FingerID: A new Security Model on Distributed System By using Finger Print

Wireless Security

If the print does not match, the phone doesn't work.... It is a flexible data network system applied as an extension to, or as an alternative for a wired LAN.... 2007) This is extremely difficult to monitor and prevent in a corporation's building-wide system that might contain hundreds of antennas.... The answer to Wi-Fi security may lie in "centralized" switches.... Originally, Wi-Fi antennas were complex systems that might include networking and security in the same box with the antenna....
15 Pages (3750 words) Essay

Considering the Most Comprehensive Method of Handling Information Security

It should be noted that information security applies to all types of data; it may be electronic data, print data or even other forms.... nbsp; Information systems are distributed in three main parts.... From the paper "Considering the Most Comprehensive Method of Handling Information security " it is clear that cryptography may be defined as the process by which data is transformed into a form that cannot be used by any other person except the authorised user....
22 Pages (5500 words) Research Paper

Online Multimedia Issues

Online music helping the manufacturing industry             Internet has a new incarnation in industry, and it is called intranet.... nbsp; On the other hand, cellular mobile system requires modular cells to supplement the satellite-based global communication system.... These systems are providing Internet broadband connections that are increasing download and upload speeds, just imagine a system with a 2 MBwhat link can do i....
13 Pages (3250 words) Essay

Modern Day Attacks against Firewalls and VPNs

nbsp;Notably, Virtual Private Networks (VPNs) refer to a network, which is created by using a public connection such as the internet.... In a similar context, firewalls are the security system used to secure the flow of information between the two networks.... Firewalls are also considered as a system of network security that controls the flow of traffic over the network created by a set of protocols (Brown University, n.... The widespread use of the internet and continuous technological advancement has been coupled with increasing risks of security breaches....
8 Pages (2000 words) Essay

Hacking and Hackers

A hacker is a person who makes use of advanced programming skills and techniques to break illegally into any specific computer system in order to expose the security flaws (Ciampa, 2009).... In such conditions, it is essential to design a reliable security system that can minimize the risk of unauthorized use of information.... This paper will describe in detail why protecting the network system from the attack of hackers is still a challenging task under research, despite various technological developments?...
8 Pages (2000 words) Literature review

Designing of Access Control Systems

This term paper "Designing of Access Control Systems" presents access control as a procedure of mediating each request to data and resources preserved by a system.... hellip; The system gives support to a number of identification media types and gives an easy means of management.... An administration system that is based on the web gives all required functions so as to control the users' access rights and perform system monitoring....
8 Pages (2000 words) Term Paper

3D Display and Printing, Hand, Head, Mind, and Eye Controlled PCs, and High-Density Portable Power

Such challenges are the driving force behind innovation and consequently, new technologies.... As new technologies emerge in various fields like computing, energy, communication, infrastructure, and medicine, it is difficult to determine which one of them will have a transformative effect on its respective field.... new technologies can also reduce the pressure that the production of goods exerts on the environment, and consequently help in conserving the environment....
11 Pages (2750 words) Essay

Cross-Cultural Aspects of Global Biometric Deployment

This will be realized through a general understanding of biometric system deployment.... General understanding of the biometric system and its deployment Biometric systems of recognition can be understood through two fundamental aspects that are defined by bodily characteristics: distinctiveness and permanence.... This means that the choice of the biometric system to deploy in any society is therefore dependent on the nature and the requirement of the intended identification application (1)....
17 Pages (4250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us