Got a tricky question? Receive an answer from students like you! Try us!

Biometric Security - Essay Example

Masters
Author : adamslottie
Essay
Technology
Pages 14 (3514 words)
Download 1

Summary

These days the world community is experiencing a fierce security scare from a number of sources. Terror related incidents in different parts of the world; despite highest security alerts is a testimony to the wide reach of the terror tentacles. The incidents taking place in Iraq, Afghanistan and Pakistan are certainly not a good sign for the humanity as such…

Extract of sample
Biometric Security

While on the one hand the terror attacks are resulting in loss of human lives, the heightened security measures are also causing lot of inconvenience to the people whenever, they have to cross over a boundary, check-in at the airport, attend a ceremony, start a train journey etc. A debate has already started as to what extent the security agencies must be snooping into the lives of people, so that it doesn't amount to loss of privacy. While on the one hand the proponents of strict security measures say that it is all being done for the sake of the security of people, there are a number of others including many human rights activists countering this claim and asking the security agencies to have some restraint in snooping on the private moments of hapless citizens.
The debate is certainly on and promises to continue for many more years or till the world community continues to be divided on religious matters or border area disputes like at West Bank continue to flare up the emotions and people like Osama-Bin-Laden continue to elude the security agencies. While the IT enabled environment has given the security agencies the much needed advanced tools to keep track of anti-social elements, the flip side is such techniques are also being used by the organised crime groups to sustain their campaigns. ...
Download paper

Related Essays

Wireless Security
For companies seeking to expand a computer network or make their employees more mobile, Bluetooth and Wi-Fi can provide a cost-effective way to maximize access to shared data and resources. Major technology companies are behind both standards, and the price and choice of products should only improve. By its nature, wireless access opens up the potential for wireless eavesdropping and data theft. (Johansson et al., 2007)Wi-Fi networks have to be carefully encrypted to prevent unauthorized use. For example, people committing fraud or dealing in illegal materials via the Internet would find…
15 pages (3765 words)
Information Security Essay
It ensures that an individuals/ group's privacy is protected/ In addition, it protects the level of availability and integrity of the information. 2…
20 pages (5020 words)
The Security Risks to Online Banking
Though, the Internet has made it possible for businesses to carry out their activities in a more efficient and cost-effective manner but at the same time, it has proved to be more insecure than traditional ways of trade because practically, it is much more difficult and expensive to tackle fraudulent activities that cyber-criminals and hackers carry out aggressively to steal confidential; financial data of online-businesses for their own benefit.…
40 pages (10040 words)
Biometric Security and Privacy
As of now it is being said that it'll be almost impossible to change the biometric features of human body, which in turn will help the security people to prepare a reliable database and identify the people with criminal background. Government of UK has taken up the exercise in right earnest and hopes to make the life happier for the citizens.…
15 pages (3765 words)
Wireless Security. Webased Online Diary System.
This allows users to move freely while continuously having connection to the same resources. It is for this reason that webased online diary system webased online diary systems are the fastest growing form of webased online diary systeming in the U.S. Security issues continue to face Wi-Fi and other webased online diary system markets. By its nature, webased online diary system access opens up the potential for webased online diary system eavesdropping and data theft. Wi-Fi webased online diary systems have to be carefully encrypted to prevent unauthorized use. For example, people committing…
16 pages (4016 words)
Barriers to using biometrics for mobile authentication
Biometrics eliminates the danger of a password being stolen, or as is more common, a password being used without proper authorisation. Biometrics can reduce the problem of corporate risk associated with a supervisor "loaning" his badge to an associate to gain unauthorised access.…
5 pages (1255 words)