Thursday, December 5, 2019

Biometric For Authentication Procedure †Free Samples for Students

Question: Discuss about the Biometric For Authentication Procedure. Answer: Introduction Biometric is an authentication procedure that entails the use of facial scans or fingerprints to identify an individual. It utilizes the user biometric data and transforms it into digital information that can be read and interpreted by the computer. Despite biometric authentication being a secure way identifying the users, in the recent first the system has faced numerous challenges and problems. For example, there has been an ongoing debate about the effectiveness of the biometric system as a mechanism to ensure surveillance and security of the users. Similarly, the system has been criticized manageability and usability as well as appropriateness in the different contexts. Finally, there have been allegations that biometric for authentication has negative social impacts because of its effects on the peoples privacy. This paper aims to explore the key issues facing biometric for authentication. Challenges of Biometric for Authentication The security system has been in the position to face challenges that have made the system to be upgraded to a newer version. The greatest challenge is that the secured items may not be accessed by any other person in case of death or accident to the extent of not being recognized. This has been the greatest issue as it has called for the upgrade of the system so that it can be able to detect the owner and the next of keen. Another pressing challenge is when an individuals identity has been faked. The imposters will be in the position to change and clear the data so that it does not recognize the owner. The act will defiantly lead to the loss of property. This has made innovators keep working so that they can come up with a system that will ensure that the access of the safe is connected to all the network of the owner. The connection will be in the position to notify the owner for the access, and so they have to accept the process (Campisi, 2013). Problem Associated to Biometric for Authentication The system has been in the position to pose problems that are seen to be a threat to the system. The biggest problem is on the way the process of taking the biometric data of an individual. An individual may have an alteration on say their fingerprints which may become be registered and later the prints do not match. Taking the example of the eye scan, this will have to take the shape of the eye of an individual. The eye at the point of taking the data may be normal, but with time the individuals eye may get complications thus altering the shape. This will later own not match with the data that was taken before (Liu, 2012). Relevant Technologies and their Applications Technology on biometric has been improved to the point that will not allow room for forging. Finger vein recognition is one of the technologies that have been invented. This is the technology that will have to take the fingerprint and the vein arrangement in the finger of the owner. This will have to take care of the alteration of the fingerprint as the vein arrangement will be as a buck up. This technology can be used in the securing of individuals money or items in the banks. Another better technology is the 3D facial recognition. This is whereby the shape of the face is taken, and so this will be used as a security measure. This is one of the technologies that cannot be forged at all. This technology can be used in the securing of the highly classified files and equipment in say the government. It can be used by the president to secure the countries missiles and warheads (Vacca, 2007). Vague areas and Research Questions The technology has not been in the position to clearly prove to us the percentage at which the secure items are safe. The fact that computers control all the systems here it may make it prone to hacking thus changing the identities or even scraping them off the database. The system is not in the position to provide a security backup in case of a breach. The question to be asked is whether there are buck up systems that have been placed or installed that may counteract the violation in the event of a detected forgery. Summary of Issues from the Forum The greatest issue that was seen to be in the position to also buck up the discussion was on the accuracy of the system. This is in the sense that the systems were designed in the meaning that there was no room for mistakes in collecting the data and storing. The data was also seen to be separately kept in a way that will not be mistaken or mishandled by other imposter individuals. This made it easier and accurate to locate the owner of the secured items. My discussion was in the position to fully contribute to the knowledge as it provided almost all the required aspects. It was in the position to cover all areas in a way that provided room for more research so that to seal the loopholes. The discussion by my peers was accurate as it was also able to prove the accuracy and functionality of the system (Ashbourn, 2011). Left out Information on Biometric for Authentication The issue of accuracy and availability was not adequately discussed. This is in the position that the system should be designed in such a way that it will always be reliable and safer than other alternatives. This is an important issue to the clients as the reason as to why they opted for the biometric was because of the accuracy and availability it has. This is important as it will have to directly influence the people who opted for the system to continue using or not. The accuracy and availability of the system should be kept at the forefront Impact and Application of the above Mention Issue The above issue has been seen to be in the position to directly affect the operation and functioning of the companies in place for the systems. It has been observed that the company if not accurate they end up losing their clients information to unauthorized individuals. The accuracy and reliability can be improved and be used by anyone who will have used the biometric authentication for security. The system will be used to secure personal information from unauthorized individuals (Lockie, 2009). Valuable lesson The lesson learned tells us that we should always go for the best, accurate and always available option. This is applicable not only to the security matters but all other factors. Therefore, biometric for authentication is a suitable system that should adopt by the organization both in the private sector and in the public sector. Conclusion The above discussion elaborates it clear that there is a lot to be done to create awareness to the public that biometric for the authentication is a good system that should be embraced by all. Despite the challenges associated with biometric for an authentication system, the value of the system is very crucial. Finally, this paper concludes that despite the system being beneficial for the businesses and general public there is a need of frequent upgrading to ensure the privacy of the users is always secured. References Campisi, P. (2013).Security and privacy in biometrics. London New York: Springer. Liu, N. (2012).Bio-privacy: privacy regulations and the challenge of biometrics. Oxon England: Routledge. Vacca, J. (2007).Biometric technologies and verification systems. Amsterdam Boston: Butterworth-Heinemann/Elsevier Ashbourn, J. (2011).Guide to Biometrics for large-scale systems: technological, operational, and user-related factors. London New York: Springer. Lockie, M. (2009).Biometric technology. Chicago: Heinemann Library

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.