Thursday, 1 August 2013

Biometric for Network Security

We explored finger, face, voice, and iris biometrics. We examined each biometrics’ strengths and weaknesses, and we looked at what types of algorithms are obtainable. Also, described the individuality that make a biometric technology good for network security. Now that we have examined both the biometrics that could be appropriate for network access and their qualities, a suggestion of which technology to use needs to be made.
The suggestion put forth here is made with the best technologies available at the time. As biometric technology advances, some of the analyses here will need to be revisited. What will remain solid is the line of attack used to evaluate which biometric system best meets the needs for network security.

Finger Biometrics

The finger biometric scored very well relative to the ideal biometric. Its greatest strengths are its deploying ability and maturity. The greatest weakness comes from the cost and hence ROI. What follows is a stop working of each characteristic for the finger biometric.

Face Biometrics

Face biometrics are being greatly researched. They offer the promise of high user reception. It seems natural to use your face for gratitude since that is what we use every day to distinguish people. This biometrics’ maximum strengths are its noninvasiveness and user receiving. The greatest weakness comes from the ROI characteristic. What follows is a breakdown of each characteristic for face biometrics.

Voice Biometrics

Voice biometrics, like face biometrics, are ordinary to use. When we cannot see someone but can hear him/her that can be enough for us to be familiar with who it is. This biometrics’ greatest strengths are its size and noninvasiveness. The greatest weaknesses come from the FAR and FRR. What follows is a breakdown of each characteristic for voice biometrics.

Iris Biometrics

Iris biometrics offers the biggest “cool” factor of all the biometrics. Iris biometrics is most often seen in spy movies, and is connected with securing only the most significant data. When it comes to its use as a biometric for set of connections security, some shortcomings are evident, yet other individuality of iris biometrics is very good-looking. Its greatest strengths lay in the FRR and FAR. The greatest weakness comes from being highly enveloping. What follows is a breakdown of each characteristic for iris biometrics.

The Choice of a Biometric for Network Access                         

As seen in this chapter, each biometric was evaluated for its appropriateness for network security and scores were given for each characteristic. Here, it is very easy to see how a meticulous biometric performed relative to the other biometrics.

What we in progress in an earlier chapter as a general conversation on biometrics for network security has completed with a choice of the best biometric for network security. This choice was based on the score that each biometric conventional based on the individuality of an ideal biometric. While the iris biometric proved to be the most protected, and voice and face biometrics had the highest levels of user reception, it was the fingerprint biometric that obtainable the best overall solution.

No comments:

Post a Comment