StudentShare solutions
Triangle menu

Biometric Security - Essay Example

Extract of sample
Biometric Security

While on the one hand the terror attacks are resulting in loss of human lives, the heightened security measures are also causing lot of inconvenience to the people whenever, they have to cross over a boundary, check-in at the airport, attend a ceremony, start a train journey etc. A debate has already started as to what extent the security agencies must be snooping into the lives of people, so that it doesn't amount to loss of privacy. While on the one hand the proponents of strict security measures say that it is all being done for the sake of the security of people, there are a number of others including many human rights activists countering this claim and asking the security agencies to have some restraint in snooping on the private moments of hapless citizens.
The debate is certainly on and promises to continue for many more years or till the world community continues to be divided on religious matters or border area disputes like at West Bank continue to flare up the emotions and people like Osama-Bin-Laden continue to elude the security agencies. While the IT enabled environment has given the security agencies the much needed advanced tools to keep track of anti-social elements, the flip side is such techniques are also being used by the organised crime groups to sustain their campaigns. Such developments point out the need for stricter surveillance. These days surveillance is carried out in different ways depending upon the requirements. While biometric surveillance help in beefing up security measures at airports, railway stations, important offices etc. measures like RF tagging is used to monitor the movement of goods, vehicles and the workforce. In some ways these measures result in loss of privacy for the common people. This study is an attempt to analyse some of the arguments for and against these measures, while taking a look at the prevailing circumstances and the advancements in technology.

Research Questions and Objectives
The study is primarily being undertaken to understand the concept of biometric security in general and the extent to which these measures have helped in strengthening the security around us. If the spate of the transnational crime and acts of terror in recent months is an indication, such security measures do not seem to have put a stop of such crime, but the routine life-style of common people certainly has come under increasing close observation from many quarters. The study will try to seek answers to the following key objectives.
To analyze the security scenario and how it has undergone changes in the last couple of years.
To find out the types of strategies adopted by the governments and security agencies to make the life of its citizens safe and secure.
How the security agencies are making use of Biometric methods to figure out the security threats at different places.
What types of problems common people feel as a result of heightened security measures and how the security agencies have started snooping on to the privacy of people
What impact does such measures have on the common people, workforce and diplomatic relations in general


Research Methodology
The methodology adopted in carrying out a research activity has the potential to affect the final outcome of the research. Depending upon the subject of research and the area of its impact the methodology is decided. ...Show more

Summary

These days the world community is experiencing a fierce security scare from a number of sources. Terror related incidents in different parts of the world; despite highest security alerts is a testimony to the wide reach of the terror tentacles. The incidents taking place in Iraq, Afghanistan and Pakistan are certainly not a good sign for the humanity as such…
Author : adamslottie
Biometric Security essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Biometric Security"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Biometric Authentication
However, this does not guarantee safety for the individual’s property and data simply because of the rising number of identity theft cases and data disclosure cases. IT developers have therefore designed several technology software which authenticate or grant an individual access to an account by virtue of a physical character such as a fingerprint.
7 pages (1750 words) Essay
Biometric Authentication 3
Provide their distinction(s) to rule-based authentication mechanisms. [25 marks] The primary goal of the military is to provide Britain with protection from external threats. In order to achieve this goal, the Department of Defense (DoD) has to deploy systems that not only protect it from external threats, but also internal ones.
6 pages (1500 words) Essay
Evaluate the claim that biometric technology is a viable and effective alternative to traditional security methods
For years, traditional security strategies such as personal PINs and passwords have been in use but with various limitations. Currently swipe cards and personal identification numbers have been introduced for increased security. Because of various challenges associated with traditional security methods, a more recent technology – biometric security method has been introduced.
5 pages (1250 words) Essay
Biometric Security and Privacy
But, the extent to which it has made us safer is still being debated. While on the one hand we have advanced security gadgets, on the other the acts of sabotage too are being carried out in most sophisticated manner. Biometric technology is an effort to diagnose the problems and fill some of the loopholes in the security setup.
15 pages (3750 words) Essay
Biometric Security
As advances in technology have been development, facilities and features ensuring the safety and security of organizations have adapted to these technological developments. One of the products of this advancement is in the area of
4 pages (1000 words) Essay
Definition of security in info. sys
The input process consists of collecting data and transforming it to a form that is suitable for processing. Manipulation of this data gives information (processing). The information thus obtained is either stored for future use
2 pages (500 words) Essay
Biometric Authentication
However, this does not guarantee safety for the individual’s property and data simply because of the rising number of identity theft cases and data disclosure cases. IT developers have
7 pages (1750 words) Essay
Information Security Physical Security models
Physical security embodies the foundation of any security model. If an intruder happens to breach the physical security of an institution, he will have access to all other security elements. A security model, on the other hand, is
3 pages (750 words) Essay
Biometric Authentication
11). Unlike password and signatures which are easily stolen by third parties, biometric authentication relies on the actual data from the actual users, leaving minimal chances. Biometric
2 pages (500 words) Essay
Biometric Centralisation vs Biometric Balkanization: which is better
It is an application of diversification of biometrics in authentication and identification as applied in multiple applications (Crawford 2002, p. 54). Biometric Balkanization provides maximum flexibility to the users a system. The users can customize some of
1 pages (250 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment
Contact Us