Tuesday, June 11, 2019
Advanced IT Research Paper Example | Topics and Well Written Essays - 750 words
Advanced IT - Research Paper ExampleIn addition, biometric enrolment in most cases is carried out in-person on a lower floor environments that are controlled making the process reliable in case of any succeeding application.The system however faces a number of challenges mostly non-trivial when it comes to security cases following(a) its inherent biometric data features. Such features make biometric matching probabilistic thus samples from a given(p) individual can never be exactly the same. This is a violation of security measures as two encrypted samples have to undergo decryption before any matching takes place. Biometric systems are unable to rely on one-ways systems performing user input harsh functions. The management is also challenged to ensure that there exists decryption and vulnerability representation in biometric processes (Abhilasha, 2007).Biometrics are almost impractical to change or revoke in cases where data has been compromised. This is because its template is in a digital data form and is mostly kept in a token or a database. Such templates come in specific vendors thus their interoperable use in a system that is disturbed becomes difficult. Biometric corroboration systems represent a location that is unsupervised presenting the high risks of attacks from sensor spoofing. This makes the output credibility of the process of biometric matching to depend completely on the integrity of the given sample and whether the sample provided is a true one from the biometric characteristic owner. Security problems also come up during the execution of biometric templates either at the client or at the server. Other privacy and security risks are witnessed in the process of keeping biometric information together with identifiable information that are personal (Abhilasha, 2007).Biometric earmark systems play a crucial role in the identification process. It is more preferable compared to other non-biometric methods. Despite this age over the other meth ods, biometric systems face a number of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.