The word "biometrics" is derived from the Greek words 'bios' and 'metric' ; which means life and measurement respectively. This directly translates into "life measurement".
General science has included biometrics as a field of statistical development since the early twentieth century. A very good example is the statistical analysis of data from agricultural field experiments comparing the yields of different varieties of wheat. In this way, science is taking a life meas
General science has included biometrics as a field of statistical development since the early twentieth century. A very good example is the statistical analysis of data from agricultural field experiments comparing the yields of different varieties of wheat. In this way, science is taking a life meas
-Biometrics is the automated method of recognizing a person based on a physiological or behavioral characteristic. Biometrics technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions.
The advantages of biometrics are the person is the key so you need never remember your card or key again. Each body part is unique and Biometrics uses your unique identity to enable a purchase activate something or unlock something. Biometrics encompasses Voice, Vein, Eye, Fingerprint, Facial recognition and more.
The disadvantages are numerous however: criminals have been known to remove fingers to open biometric locks, Biometrics requires a lot of data to be kept on a person, these systems are not always reliable as human beings change over time if you are ill; eyes puffy, voice hoarse or your fingers are rough from laboring for example it maybe more difficult for the machinery to identify you accurately. Every time you use Biometrics you are being tracked by a database bringing up a range of privacy issues. The final disadvantage is the expense and technical complexity of such systems.
The disadvantages are numerous however: criminals have been known to remove fingers to open biometric locks, Biometrics requires a lot of data to be kept on a person, these systems are not always reliable as human beings change over time if you are ill; eyes puffy, voice hoarse or your fingers are rough from laboring for example it maybe more difficult for the machinery to identify you accurately. Every time you use Biometrics you are being tracked by a database bringing up a range of privacy issues. The final disadvantage is the expense and technical complexity of such systems.
Disadvantages of a biometric system.
· The finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication.
· It is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there there are too much noise in the environment this method maynot authenticate correctly. Therefore this method of verification is not workable all the time
· For people affected with diabetes, the eyes get affected resulting in differences.
· Biometrics is an expensive security solution.
· Advantages of Biometrics :
* Increase security - Provide a convenient and low-cost additional tier of security.
* Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise the opportunity for ID fraud, buddy punching.
* Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorised use of lost, stolen or "borrowed" ID cards.
* Reduce password administration costs.
* Replace hard-to-remember passwords which may be shared or observed.
* Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access
* Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!
* Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance.
* Unequivocally link an individual to a transaction or event.
* Increase security - Provide a convenient and low-cost additional tier of security.
* Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise the opportunity for ID fraud, buddy punching.
* Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorised use of lost, stolen or "borrowed" ID cards.
* Reduce password administration costs.
* Replace hard-to-remember passwords which may be shared or observed.
* Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access
* Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!
* Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time & Attendance.
* Unequivocally link an individual to a transaction or event.
Encryption refers to algorithmic schemes that encode plain text into non-readable form or cyphertext, providing privacy. The receiver of the encrypted text uses a "key" to decrypt the message, returning it to its original plain text form. The key is the trigger mechanism to thealgorithm.
Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption.
Web browsers will encrypt text automatically when connected to a secure server, evidenced by an address beginning with https. The server decrypts the text upon its arrival, but as the information travels between computers, interception of the transmission will not be fruitful to anyone "listening in." They would only see unreadable gibberish.
There are many types of encryption and not all of it is reliable. The same computer power that yeilds strong encryption can be used to break weak encryption schemes. Initially, 64-bitencryption was thought to be quite strong, but today 128-bit encryption is the standard, and this will undoubtedly change again in the future.
Access control is a system that enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure.
Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATMsystem at a bank is another means of access control. The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment.
Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.
Advantage
-Card entry systems are usedo prevent access to areas such as condominiums, office buildings, warehouses and other facilities. They eliminate problem with unauthorized key usage, in caseit was copied or lost. Each access card or key fob has unique number that can be deleted from the system if lost or stolen.
Before access controls were only in secret military facilities, but now they are widely used in airports, residential buildings and large and small businesses. When access granted, each cardholderis identified in the system and log information will stay in database for up to 3 years. Log memory allows you to control door activity, when and who was entering the door.
Proximity cards and keychain fobs are primarily used foraccess control system. Cards can be programmed different from others.
Before access controls were only in secret military facilities, but now they are widely used in airports, residential buildings and large and small businesses. When access granted, each cardholderis identified in the system and log information will stay in database for up to 3 years. Log memory allows you to control door activity, when and who was entering the door.
Proximity cards and keychain fobs are primarily used foraccess control system. Cards can be programmed different from others.
Some have limited access to only main entrance during business hours, others - to unlock safes, and secured server rooms.System can be embedded in elevators wherecardholdersdo not have access to certain floors. So, office workers or apartment residents using elevator, can get access only to the floor that they live or work on. Access control system can be programmed to time zones, where user is given certain days and hours to enter premises.
Cardholders information is not stored on the access card or key fob. All personal data such as name, address, phone number and picture stored in access controller database where user is registered. Even if you try to use the card in another building using same access control system, it will not pass on any of your personal information. The head of department or managerat any time can modify cardholders permissions and entry limitationson his or her account.
Cardholders information is not stored on the access card or key fob. All personal data such as name, address, phone number and picture stored in access controller database where user is registered. Even if you try to use the card in another building using same access control system, it will not pass on any of your personal information. The head of department or managerat any time can modify cardholders permissions and entry limitationson his or her account.
They can decide whether to allow access to premises, allow only at certain time or do not allow at all.All this and much more access control system can provide.
4. A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
- Advantages of hardware firewalls over software firewall:
· Speed: Normally, the hardware firewalls are tailored for faster response times, and hence handle more traffic loads.
· Security: A firewall with its own operating system (proprietary) is less prone for attacks. This in turn reduces the security risk. In addition, hardware firewalls have enhanced security controls.
· No Interference: A box, that is separated from other network components can be managed better, and does not load or slowdown other applications. The box can be moved, shutdown, or reconfigured with minimal interference to the network.
Disadvantage of hardware firewalls:
· Cost. Normally, a dedicated hardware firewall costs more than a software firewall.
· Difficult to install, and upgrade.
· Takes up physical space, and involves wiring.