Research Paper Assignments | Online Homework Help
Biometric Security Devices
Assume you are working for a medium-sized company that sells products on its Web site and that the company keeps the computers that run its Web server, database server, and transaction processing server in the office next to yours. Describe what a bio-metric security device is and explain how your employer might use one to more of these devices to protect its servers
Please respond to the initial question by day 5 and be sure to post two additional times 50-75 words to peers and/or instructor by day 7. The initial post by day 5 should be 75 to 150 words, but may go longer depending on the topic. Do not write in 3rd person! If you use any source outside of your own thoughts, you should reference that source. Include solid grammar, punctuation, sentence structure, and spelling.
Sylvester Lloyd
Biometric device is a devise used to scan for identification and authentication in various ways and methods to recognize the identity of individuals or living persons based on their behavior and physiological characteristics such as voice recognition, Iris prints, facial recognition, and fingerprints. This system captures data from an individual hand or however the system is programmed to identify a person. When an individual approaches a major business such as researching labs, top security entrance, and much more the Biometric system is in place to ensure clearance. Once the system is approached, it will scan your eyes, hands, and voice depending how the Biometric system is programmed it takes a picture of the employee and afterwards the system breaks down that employee information to ensure he or she is the correct person before gaining entrance.
Example: Deployed in Afghanistan in charge of 5 major contracts for the Afghans on a specific secured site, we used the Iris print system to identify the true identity of who gets in.
Now many large and small businesses employers and employees use the Biometric system for clocking in and out is required using Iris or another system depending how the system is set up.
Maria Mccollins
Providing security for businesses that have confidential and pertinent information is very important to protect a business and its clients. The size of the business does not matter when it comes to securing the information that is on hand. Having different forms of security makes it more difficult for others to get vital information that does not need to be shared with others. A biometric security device, according to Schneider (2017), is defined as “one that uses an element of a person’s biological makeup to perform the identification.” This is a more extreme level of security that makes it more difficult for anyone to enter anything that it is protecting.
In order to keep the information safe within the company, the employer that sells products on the website may use one of these measures to protect its servers. In order for people to enter the office that holds the computers and servers, a palm scan would be a source of security due to no one having the same palm print. The palms would be previously scanned and stored into the biometric security device so that once it is scanned at the door of the office, it will be able to tell if the person has access to the room. “In order to achieve consistency when capturing images, most of the palm image recognition machines will use fixed small cylinder mainly to make palm fixedly placed, but this way becomes a disadvantage of palm geometry recognition, because not every palm is able to meet the size of the cylinder fixed range” (Chih-Yu et al., 2013). With vital information being on the servers and computers, there should be not only a password on the computer, but also another form of biometric security device. Having a finger print reader on the actual server, once the person is allowed into the room would make it more secure. Information that is sensitive should be guarded and treated as if it needs to be protected.
Chih-Yu Hsu, Pei-Shan Lee, Kuo-Kun Tseng, & Yifan Li. (2013). Palm Personal Identification for Vehicular Security with a Mobile Device. International Journal of Vehicular Technology, 1–13. https://doi.org/10.1155/2013/901524
Schneider, G. P. (2017). Electronic commerce. Boston: Cengage Learning.