Computer security

Title: Computer security
Category: /History/European History
Details: Words: 2627 | Pages: 10 (approximately 235 words/page)
Computer security
Biometrics is now becoming more popular with the introduction of information technology. This technology is used to verify and/or identity someone using his or her own unique physical patterns, for example fingerprints, facial recognition, iris scanning, retinal scan and hand geometry or behavioural patterns such as voice, keystroke dynamics and signatures (See Appendix 1). Until recently, biometrics was considered intrusive and too expensive for most companies, but now with the need for increased security, the …showed first 75 words of 2627 total…
You are viewing only a small portion of the paper.
Please login or register to access the full copy.
…showed last 75 words of 2627 total…of individual features such as width of the fingers at different locations, length of the fingers, etc to confirm verification. As well as using the biological set up for biometrics, behavioural patterns can also be used, these include voice recognition, keystroke dynamics and signatures, these methods verify identification rather than identify. References Wirtz, J., Heracleous, L. (2005), "Biometrics meets services", Harvard Business Review, No.February, pp.48. International Biometrics Group (2005), available at: www.biometricgroup.com (accessed July 2005),

Need a custom written paper?