Computer Security 3

Computer Security 3 - As defined in Computer Security...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
As defined in Computer Security Basics by O'Reilly & Associates, Inc. Biometrics is the use of a persons unique physiological, behavioral, and morphological characteristics to provide positive personal identification. Biometric systems that are currently avaiable today examine fingerprints, handprints, and retina patterns. Systems that are close to biometrics but are not classified as such are behavioral systems such as voice, signature and keystroke systems. They test patterns of behavior not parts of the body. It seems that in the world of biometrics that the more effective the device, the less willing people will be to accept it. Retina pattern devices are the most reliable but most people hate the idea of a laser shooting into their eye. Yet something such as monitoring keystroke patters people don't mind, but it's not nearly as effective. Biometric verification is forecast to be a multibillion dollar market in this decade. There is no doubt that financial credit and debit cards are going to be
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/03/2011 for the course ECON 101 taught by Professor Smith during the Spring '09 term at Harvard.

Page1 / 2

Computer Security 3 - As defined in Computer Security...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online