Tuesday, June 11, 2019

Biometric Authentication Essay Example | Topics and Well Written Essays - 500 words

Biometric Au hencetication - Essay ExampleThe desirable processes of biometric authentication methods that make it reliable include verification, covering and identification.This process makes use of a watch list or a database, containing data of people to be excluded. It has records containing only the biometric information for specific individual (Ratha, Connell & Bolle 2001, p. 610). all(prenominal) individual provides biometric samples to be checked to confirm if it matches the watch-list.This process is used in the discovery of an individual without the drug users prior claim of identity. It checks the bio information against the circumscribe of a central database without which it cannot operate.This is the attack where a person pretends to be a genuine person or individual service provider and prompts a user to provide personal bio data. Once the data is available and has passed through verification, the perpetrator of the attack performs unauthorized transactions.The phish ing attack is equally harmful and takes place with or without the knowledge of the owner of the bio data. For example, an individual gets into a banking hall, gets into a dust bin and collects half-filled customer vouchers containing handwritten signature or fingerprint. He or she scans the signatures and finger prints which are then used electronically for valid online transactions.Biometric methods are more secure in the performance of online transactions. The owner provides Unique biometric information only when required electronically, unlike in the use of ordinary identification numbers.A biometric method provides a high degree of privacy to users and minimizes the exposure of information to unauthorized parties (Weaver 2006, p. 99). For example, for an iris scan to be done, a person must be physically available.It is possible to fraudulently reproduce biometric data depending on the resources, modality, the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.