In a typical office, biometric authentication might be used to control access to employees and registered visitors only. We know the system will have some false negatives, some employees falsely denied access, so we need a human override, someone who can examine the employee and allow access in spite of the failed authentication. Thus, we need a human guard at the door to handle problems as well as the authentication device; without biometrics, we would have had just the guard. Consequently, we have the same number of personnel with or without biometrics, plus we have the added cost to acquire and maintain the biometrics system. Explain the security advantage in this situation that justifies the extra expense.
What will be an ideal response?
By automating the vast majority of authentications, the guard can better scrutinize the few that require manual intervention, and the guard’s choices can be audited more easily. Also, the guard’s newly acquired downtime can be spent on new security tasks.
You might also like to view...
Given an array of integers of size 5, how does the computer know where the 3rd indexed variable is located?
a. It adds 3 to the base address of the array b. It adds space for 3 integers to the base address of the array c. It remembers where all the indexed variables of the array are located. d. None of the above
A(n) DVR is the software that compresses a video stream when the video is stored and decompresses the file when the video is played.
Answer the following statement true (T) or false (F)
In the physical connection for ISDN, the most common interface for your computer is a device called a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
In order to inherit from a user-defined base class, you must ____.
A. store both files in the same directory B. add the base class following a colon C. add a reference to the base class D. store both files using the same extension