Computer security
Title: Computer security
Category: /History/European History
Details: Words: 2627 | Pages: 10 (approximately 235 words/page)
Computer security
Category: /History/European History
Details: Words: 2627 | Pages: 10 (approximately 235 words/page)
Biometrics is now becoming more popular with the introduction of information technology. This technology is used to verify and/or identity someone using his or her own unique physical patterns, for example fingerprints, facial recognition, iris scanning, retinal scan and hand geometry or behavioural patterns such as voice, keystroke dynamics and signatures (See Appendix 1). Until recently, biometrics was considered intrusive and too expensive for most companies, but now with the need for increased security, the
showed first 75 words of 2627 total
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
Please login or register to access the full copy.
showed last 75 words of 2627 total
of individual features such as width of the fingers at different locations, length of the fingers, etc to confirm verification. As well as using the biological set up for biometrics, behavioural patterns can also be used, these include voice recognition, keystroke dynamics and signatures, these methods verify identification rather than identify.
References
Wirtz, J., Heracleous, L. (2005), "Biometrics meets services", Harvard Business Review, No.February, pp.48.
International Biometrics Group (2005), available at: www.biometricgroup.com (accessed July 2005),