Tuesday, April 23, 2019

Biometric Authentication Essay Example | Topics and Well Written Essays - 500 words

Biometric Authentication - Essay ExampleThe desirable processes of biometric authentication methods that make it good include verification, screening and identification.This process makes use of a watch list or a selective informationbase, containing data of people to be excluded. It has records containing only the biometric information for specific individual (Ratha, Connell & Bolle 2001, p. 610). Every individual provides biometric samples to be analyze to confirm if it matches the watch-list.This process is used in the discovery of an individual without the users prior fill of identity. It checks the bio information against the contents of a central database without which it cannot operate.This is the attack where a person pretends to be a literal person or individual service provider and prompts a user to provide personal bio data. once the data is available and has passed through verification, the perpetrator of the attack performs unauthorized transactions.The phishing atta ck is equally harmful and takes roll with or without the knowledge of the owner of the bio data. For example, an individual gets into a banking hall, gets into a dust bin and collects half-filled customer vouchers containing written signature or fingerprint. He or she scans the signatures and finger prints which are then used electronically for sensible online transactions.Biometric methods are more secure in the performance of online transactions. The owner provides Unique biometric information only when compulsory electronically, unlike in the use of ordinary identification numbers.A biometric method provides a high grade of privacy to users and minimizes the exposure of information to unauthorized parties (Weaver 2006, p. 99). For example, for an iris scan to be done, a person essential be physically available.It is possible to fraudulently reproduce biometric data depending on the resources, modality, the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.