Biometric Security Devices
Assume you are working for a medium-sized company that sells products on its Web site and that the company keeps the computers that run its Web server, database server, and transaction processing server in the office next to yours. Describe what a bio-metric security device is and explain how your employer might use one to more of these devices to protect its servers
Please respond to the initial question by day 5 and be sure to post two additional times 50-75 words to peers and/or instructor by day 7. The initial post by day 5 should be 75 to 150 words, but may go longer depending on the topic. Do not write in 3rd person! If you use any source outside of your own thoughts, you should reference that source. Include solid grammar, punctuation, sentence structure, and spelling.
Biometric device is a devise used to scan for identification and authentication in various ways and methods to recognize the identity of individuals or living persons based on their behavior and physiological characteristics such as voice recognition, Iris prints, facial recognition, and fingerprints. This system captures data from an individual hand or however the system is programmed to identify a person. When an individual approaches a major business such as researching labs, top security entrance, and much more the Biometric system is in place to ensure clearance. Once the system is approached, it will scan your eyes, hands, and voice depending how the Biometric system is programmed it takes a picture of the employee and afterwards the system breaks down that employee information to ensure he or she is the correct person before gaining entrance.
Example: Deployed in Afghanistan in charge of 5 major contracts for the Afghans on a specific secured site, we used the Iris print system to identify the true identity of who gets in.
Now many large and small businesses employers and employees use the Biometric system for clocking in and out is required using Iris or another system depending how the system is set up.
Providing security for businesses that have confidential and pertinent information is very important to protect a business and its clients. The size of the business does not matter when it comes to securing the information that is on hand. Having different forms of security makes it more difficult for others to get vital information that does not need to be shared with others. A biometric security device, according to Schneider (2017), is defined as “one that uses an element of a person’s biological makeup to perform the identification.” This is a more extreme level of security that makes it more difficult for anyone to enter anything that it is protecting.
In order to keep the information safe within the company, the employer that sells products on the website may use one of these measures to protect its servers. In order for people to enter the office that holds the computers and servers, a palm scan would be a source of security due to no one having the same palm print. The palms would be previously scanned and stored into the biometric security device so that once it is scanned at the door of the office, it will be able to tell if the person has access to the room. “In order to achieve consistency when capturing images, most of the palm image recognition machines will use fixed small cylinder mainly to make palm fixedly placed, but this way becomes a disadvantage of palm geometry recognition, because not every palm is able to meet the size of the cylinder fixed range” (Chih-Yu et al., 2013). With vital information being on the servers and computers, there should be not only a password on the computer, but also another form of biometric security device. Having a finger print reader on the actual server, once the person is allowed into the room would make it more secure. Information that is sensitive should be guarded and treated as if it needs to be protected.
Chih-Yu Hsu, Pei-Shan Lee, Kuo-Kun Tseng, & Yifan Li. (2013). Palm Personal Identification for Vehicular Security with a Mobile Device. International Journal of Vehicular Technology, 1–13. https://doi.org/10.1155/2013/901524
Schneider, G. P. (2017). Electronic commerce. Boston: Cengage Learning.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more