Describe some examples of systems that use biometric techniques to authenticate users.?
What will be an ideal response?
England has a large database of earprints. Research shows that no two ears are the same; thus, an earprint is useful in helping to identify an individual. Fingerprints have, of course, long been used to distinguish one individual from another. Now, desktop devices the size of a computer mouse can scan a user's thumbprint and allow or disallow the user access to a computer system. Systems also are available that can record and digitize your voice. The digital voice pattern is compared to a stored sample, and the software determines if the match is close enough for validation. Retinal scans (the retina is the inside back lining of the eye) have been commonly featured in movies and do exist in the real world as a security technique, although to a small degree due to complexity and cost. An additional impediment has been that people are squeamish when told a laser is going to scan the inside of their eyeballs. Another part of the eye that is unique among all individuals is the iris, or the colored
portion of the eye. Some security devices use the iris to identify people who are allowed to access a given system. Because the technology needed to perform iris scans is less expensive than retinal scan technology, it is more likely that we will see iris scans performed in the near future. Other research in the field of biometric techniques has been aimed at digitizing the features of the entire face and comparing this digital representation with a stored image. Companies that manufacture 24-hour automatic teller machines are interested in replacing the credit-card-sized automatic teller machine (ATM) card and corresponding PIN with something that cannot be as easily stolen, such as a fingerprint, faceprint, or eyeprint. To enhance their security, many companies require combinations of forms of identification, such as a password and a thumbprint.?
You might also like to view...
You can change the outline shape of an image either with or without a border
Indicate whether the statement is true or false
According to the Gregg Reference Manual, ________ page numbers should display in the bottom center of preliminary pages such as CONTENTS and ILLUSTRATIONS
A) Arabic number B) capital letter C) Roman numeral D) lowercase letter
What is the Watch Window? When would it be beneficial to have a Watch Window open?
What will be an ideal response?
What certification might be required of IT personnel on a help desk?
A) CCPC B) CCIE C) DNA D) A+