Monday, May 4, 2020

Fundamental of Security Technology

Question: Describe about history of biometric security, applications of biometric security system, effectiveness of biometric security System and issues of biometric security system. Answer: History of Biometric Security In the contemporary era, security technology has been developed in a significant manner, which has ensured the safety as well as privacy of essential data and other important aspects. Moreover, development of security technology also has enhanced the features of cryptography technology, which usually used in case of maintaining information security. In this context, Hassanain, Shaarawy and Hesham (2010) argued that through emphasizing towards cryptographic algorithms key length, complexity and resistance techniques it would be possible to verify the authentication of legitimate user and unauthorized user (Jain Nandakumar, 2012). On the other hand, implication of biometric security also may prevent data loss and data accessibility to an unauthorized member. In order to highlight the history of biometrics security, it can be asserted that thousand years before human usually used voice, gait and face of the individuals with an intention of recognizing proper identity. Based on that particular idea, biometric security technology has been introduced, which usually used for identification and verification purpose. In the contemporary era, biometric algorithms are designed in such a manner, which usually help to detect fingerprint, face, hand geometry, voice and IRIS among others. Applications of Biometric Security System Similarly, in order to highlight the applications of biometric security, it can be asserted that biometric security vastly used in case of commercial applications such as electronic data security, e-commerce and computer network logins and internet access among others. Apart from this, biometric security also used in case of cellular phones and ATMs and credit cards physical access control purpose (Hassanain, Shaarawy Hesham, 2010). On the contrary, it is also viewed that biometric security also used in case of government associated applications such as drivers licenses, border control, passport control, social security and in case of national ID cards (Kanak Sogukpinar, 2012). In accordance with Hong and Jung (2014), traditionally biometric security system has been used in case of commercial applications based on knowledge based approach for the identification or recognition of PINs and passwords. However, in the contemporary era government applications are also using biometric security system based on ID cards and badges for identification of authorized accessibility (Jain Nandakumar, 2012). Similarly, the forensic applicant is also using security tokens during the data and information access purpose. Based on the viewpoint of Biggio et al. (2015) it is recognized that biometric security system is relied on certain parameters such as uniqueness, collectability, universality, permanence, performance, acceptability and circumvention. For an instance, each person having a unique DNA and it is impossible to make a duplicate of it (Barman, Samanta Chattopadhyay, 2015). Thus, it can be stated that biometric security may ensure the authentic access on a database. Similarly, parameter indicates unique characteristics of a person such as retinal and iris identity, which is cannot be replicated. Thus, biometric security may ensure the safety or confidentiality of any personnel data, which is projected by the help of biometric password. Similarly, collectability is being considered as one of the key parameters, which usually helps to identify the characteristic and traits of an individual. In relation to this, it can be asserted that through emphasizing towards the biometric security, it is possible to ensure the accuracy and robustness of a verification process (Kanak Sogukpinar, 2012). Consequently, it is also viewed that through concentrating on acceptability, it is possible to prevent the chances of failure in case of verification process and it also ensure validate acceptance on a biometric technologies. Effectiveness of Biometric Security System Through the help of biometric security system, it is possible to recognize and identity authentic process, which ensures high security in case of secured computer and doors. Thus, it can be claimed that through the help of biometric security system, individuals may mitigate data loss associated risk and problems in a more effective as well as efficient manner (Barman, Samanta Chattopadhyay, 2015). In relation to this, it can be claimed that through adoption of biometric security it is possible to minimize the burden of complicated and long password necessities of the individuals, by saving time and investment. Issues of Biometric Security System Though biometric security systems have lot of effectiveness in its application still it shows lot of issues also, during its performance. Most of the manufacturers are claiming that there is no problem with their products but the most common issues that happen with their devices are the recognition problems. In recent time it is found that the common problem of the biometric security are lifted finger prints, making a gummy eyeball, or attempting to mimic someones gait that are not recognized by the device even they are original. This type of problem is not only slows or hinder the process but it also raise question on its security (Kanak Sogukpinar, 2012). Recent technological advancement is the main issue for the biometric user because they are easily making fake identification for biometric device that can have unauthorized usage and loss of data. References Barman, S., Samanta, D., Chattopadhyay, S. (2015). Fingerprint-based crypto-biometric system for network security.EURASIP Journal on Information Security,2015(1). Biggio, B., Fumera, G., Russu, P., Didaci, L., Roli, F. (2015). Adversarial Biometric Recognition: A review on biometric system security from the adversarial machine-learning perspective.IEEE Signal Process. Mag.,32(5), 31-41. Hassanain, K., Shaarawy, M. Hesham, E., (2010). A proposal for a biometric key dependent cryptosystem. Global Journal of Computer Science and Technology, 10(11), 42-47. Hong, K., Jung, E. (2014). Hand Biometric Information Recognition System of Mobile Phone Image for Mobile Security.Journal Of Digital Convergence,12(4), 319-326. Jain, A., Nandakumar, K. (2012). Biometric Authentication: System Security and User Privacy. Computer,45(11), 87-92. Kanak, A., Sogukpinar, I. (2012). BioPSTM: a formal model for privacy, security, and trust in template-protecting biometric authentication.Security and Communication Networks,7(1), 123-138.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.