Term Paper on "Biometric Security"

Term Paper 4 pages (1181 words) Sources: 5

[EXCERPT] . . . .

Biometric Security in Both The Public Agency and Private Firm

Biometric Security carries highly technological implications. And to an extent, these implications are valid as expanding capabilities in computing and software design enable yet more complex human identifiers to be observed and compiled. However, research denotes that biometric observation for purposes of civil control and public security has been commonplace in law enforcement and within the intelligence community for many decades. Technovelgy (2010) provides a useful introductory assessment of biometric technology, indicating that this is a practice which begins with the basic data-basing of physical features and identifying characteristics of members of a population. To this extent, we may take for granted that a highly commonplace item is a central tool in law enforcement. Technovelgy notes that "your driver's license contains biometric information about you. Your height, weight, hair color and eye color are all physical characteristics that can easily be checked. However, your height changes with age (16-year-old drivers get taller, senior citizens get shorter). Your hair color changes naturally (and on purpose)." (Technovelgy, 1)

This helps to provide us with a clear impetus for the attention which has been dedicated by the research & development teams at private firms, think tanks and government agencies alike to achieving a higher level of security capability using biometric clues. Particularly today, the various threats to public security related to biometric identity have been multiplied by the vulnerability produced through the web; by the atmosphere of security paranoia precipitated by the threat o
Continue scrolling to

download full paper
f modern terrorism and cyber-terrorism; and by the omnipresent danger of identity theft which now roams freely through the information superhighway. It is for this reason that many public agencies -- even those which are not inherently prone to security threats -- have begun to adopt technologies which are driven by biometric data. An example is presented to us in the article by Roberts (2010) which reports on the Ventura, California Fire Department's recent adoption of such technology. The department commissioned the outside it agency called DigitalPersona Pro-to update its computer and security systems together. According to the article by Roberts, "DigitalPersona Pro-now enables the department to tie a user session on the computer with the specific user's online profile through biometric fingerprint login, said Pablo Parades, the department's it account manager." (Roberts, 1)

This is an example of the opportunity to streamline business accountability and procedural monitoring in order to prevent unwanted system invasion, to decrease the opportunity for fraud, to reduce the system's susceptibility to tampering and to create a usable database of biometric identifiers for all personnel. In addition to public agency and private business use, many technology firms are on the cusp of offering widespread biometric security options for certain communication devices. This is a compelling opportunity in the consumer market because communication devices such as cellular phones, personal computer and wireless networks are used to exchange information that is sensitive in both the personal and professional realms. Accordingly, a recent press release indicates that the Android phone designed by Motorola and carried most significantly by the Verizon Wireless Network, will begin to standardize certain biometric security features in forthcoming versions of the smart phone and wireless communication device.

The featured technology, called BioLock, "operates via face recognition, iris recognition or password input to secure one's phone or specific apps or functions on the phone. Additionally, the face recognition feature utilizes blink and pupil dilatation detection to prohibit someone from using a picture of the phone's owner to gain access to sensitive areas." (ThirdFactor, 1) This… READ MORE

Quoted Instructions for "Biometric Security" Assignment:

This research paper needs an abstract and should cover a brief history of biometric security and its uses today and the implication and impact today and in the future.

How to Reference "Biometric Security" Term Paper in a Bibliography

Biometric Security.” A1-TermPaper.com, 2010, https://www.a1-termpaper.com/topics/essay/biometric-security-both/6697. Accessed 6 Jul 2024.

Biometric Security (2010). Retrieved from https://www.a1-termpaper.com/topics/essay/biometric-security-both/6697
A1-TermPaper.com. (2010). Biometric Security. [online] Available at: https://www.a1-termpaper.com/topics/essay/biometric-security-both/6697 [Accessed 6 Jul, 2024].
”Biometric Security” 2010. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/biometric-security-both/6697.
”Biometric Security” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/biometric-security-both/6697.
[1] ”Biometric Security”, A1-TermPaper.com, 2010. [Online]. Available: https://www.a1-termpaper.com/topics/essay/biometric-security-both/6697. [Accessed: 6-Jul-2024].
1. Biometric Security [Internet]. A1-TermPaper.com. 2010 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/biometric-security-both/6697
1. Biometric Security. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/biometric-security-both/6697. Published 2010. Accessed July 6, 2024.

Related Term Papers:

Security Risk Analysis Essay

Paper Icon

Security Risk Assessment for Ajax

Organizational risks

Organizational risks are complex and as a result are difficult to foresee and eliminate than are technical risks. Organizational risks include a wide-ranging… read more

Essay 5 pages (1430 words) Sources: 3 Topic: Business / Corporations / E-commerce


Security Plan Case Study

Paper Icon

Security Plan

The Maryland public safety education and training center deals with firearms training, public safety and education, and drug abuse resistance. The center is located on a 700 acre… read more

Case Study 9 pages (2681 words) Sources: 6 Topic: Computers / IT / Internet


Biometric for Security Dissertation

Paper Icon

Biometric for Security

Biometric security is a fast growing domain of security systems. The use of biometric systems involves the use of automated techniques in the process of identifying an… read more

Dissertation 5 pages (1493 words) Sources: 3 Topic: Computers / IT / Internet


Biometric Information Systems and Privacy Rights Essay

Paper Icon

Biometric Information Systems and Privacy Rights

Biometric information systems are systems that cover a wide range of technologies for technologies that can be used to verify the identity of individuals… read more

Essay 4 pages (1381 words) Sources: 8 Topic: Computers / IT / Internet


Biometric Technology and Security Pros and Cons Research Proposal

Paper Icon

Computer Technology - Biometrics

BIOMETRIC TECHNOLOGY: SECURITY PROS and CONS

Biometric authentication has developed substantially as an emerging field of computer-based security since its introduction shortly before the end of… read more

Research Proposal 2 pages (587 words) Sources: 5 Topic: Computers / IT / Internet


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!