We explored finger, face,
voice, and iris biometrics. We examined each biometrics’ strengths and weaknesses, and we
looked at what types of algorithms are obtainable. Also, described the individuality that make a biometric technology good for network security. Now that we
have examined both the biometrics that could be appropriate for network
access and their qualities, a suggestion of which technology to use needs to be made.
The suggestion put forth here is made with the best technologies available at the time. As biometric technology advances, some of the analyses here
will need to be revisited. What will remain solid is the line of attack used to
evaluate which biometric system best meets
the needs for network security.
Finger Biometrics
The finger biometric scored very well relative to the ideal biometric.
Its greatest strengths are its deploying ability and maturity. The greatest
weakness comes from the cost and hence ROI. What follows is a stop working of
each characteristic for the finger biometric.
Face Biometrics
Face biometrics are being greatly researched. They offer
the promise of high user reception. It seems natural to use your face for gratitude
since that is what we use every day to distinguish people. This biometrics’ maximum strengths are its
noninvasiveness and user receiving. The greatest weakness comes from the ROI
characteristic. What follows is a breakdown of each characteristic for face biometrics.
Voice Biometrics
Voice biometrics,
like face biometrics, are ordinary to
use. When we cannot see someone but can hear him/her that can be enough for us
to be familiar with who it is. This biometrics’ greatest strengths are its size and
noninvasiveness. The greatest weaknesses come from the FAR and FRR. What
follows is a breakdown of each characteristic for voice biometrics.
Iris Biometrics
Iris biometrics offers the biggest “cool” factor of
all the biometrics. Iris biometrics is most often seen in spy movies, and
is connected with securing only the most significant data. When it comes to its
use as a biometric for set of connections security, some
shortcomings are evident, yet other individuality of iris biometrics is very good-looking. Its greatest
strengths lay in the FRR and FAR. The greatest weakness comes from being highly
enveloping. What follows is a breakdown of each characteristic for iris biometrics.
The Choice of a Biometric for Network Access
As seen in this chapter, each biometric was evaluated for its appropriateness
for network security and scores were given for each characteristic. Here, it is
very easy to see how a meticulous biometric performed relative to the other biometrics.
What we in progress in an earlier chapter as a general conversation on biometrics for
network security has completed with a choice of the best biometric for
network security. This choice was based on the score that each biometric conventional
based on the individuality of an ideal biometric. While the iris biometric proved to
be the most protected, and voice and face biometrics had the
highest levels of user reception, it was the fingerprint biometric that obtainable
the best overall solution.
No comments:
Post a Comment