Research Paper Assignments | Online Homework Help

Biometric Security Devices

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Assume you are working for a medium-sized company that sells products on its Web site and that the company keeps the computers that run its Web server, database server, and transaction processing server in the office next to yours. Describe what a bio-metric security device is and explain how your employer might use one to more of these devices to protect its servers


Please respond to the initial question by day 5 and be sure to post two additional times 50-75 words to peers and/or instructor by day 7. The initial post by day 5 should be 75 to 150 words, but may go longer depending on the topic.  Do not write in 3rd person! If you use any source outside of your own thoughts, you should reference that source. Include solid grammar, punctuation, sentence structure, and spelling.

Sylvester Lloyd

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Biometric device is a devise used to scan for identification and authentication in various ways and methods to recognize the identity of individuals or living persons based on their behavior and physiological characteristics such as voice recognition, Iris prints, facial recognition, and fingerprints. This system captures data from an individual hand or however the system is programmed to identify a person. When an individual approaches a major business such as researching labs, top security entrance, and much more the Biometric system is in place to ensure clearance. Once the system is approached, it will scan your eyes, hands, and voice depending how the Biometric system is programmed it takes a picture of the employee and afterwards the system breaks down that employee information to ensure he or she is the correct person before gaining entrance.

Example: Deployed in Afghanistan in charge of 5 major contracts for the Afghans on a specific secured site, we used the Iris print system to identify the true identity of who gets in.

Now many large and small businesses employers and employees use the Biometric system for clocking in and out is required using Iris or another system depending how the system is set up.

professional writing services near me

Maria Mccollins

Providing security for businesses that have confidential and pertinent information is very important to protect a business and its clients.  The size of the business does not matter when it comes to securing the information that is on hand.  Having different forms of security makes it more difficult for others to get vital information that does not need to be shared with others.  A biometric security device, according to Schneider (2017), is defined as “one that uses an element of a person’s biological makeup to perform the identification.”  This is a more extreme level of security that makes it more difficult for anyone to enter anything that it is protecting.

In order to keep the information safe within the company, the employer that sells products on the website may use one of these measures to protect its servers.  In order for people to enter the office that holds the computers and servers, a palm scan would be a source of security due to no one having the same palm print.  The palms would be previously scanned and stored into the biometric security device so that once it is scanned at the door of the office, it will be able to tell if the person has access to the room.  “In order to achieve consistency when capturing images, most of the palm image recognition machines will use fixed small cylinder mainly to make palm fixedly placed, but this way becomes a disadvantage of palm geometry recognition, because not every palm is able to meet the size of the cylinder fixed range” (Chih-Yu et al., 2013).  With vital information being on the servers and computers, there should be not only a password on the computer, but also another form of biometric security device.  Having a finger print reader on the actual server, once the person is allowed into the room would make it more secure.  Information that is sensitive should be guarded and treated as if it needs to be protected.

Chih-Yu Hsu, Pei-Shan Lee, Kuo-Kun Tseng, & Yifan Li. (2013). Palm Personal Identification for Vehicular Security with a Mobile Device. International Journal of Vehicular Technology, 1–13.

Schneider, G. P. (2017). Electronic commerce. Boston: Cengage Learning.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Homework Writing Services
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Good response.
Customer 454463, May 5th, 2022
Business Studies
Good Job
Customer 453413, April 27th, 2020
Customer 463813, April 19th, 2023
English 101
Customer 463149, July 12th, 2022
Excellent work.
Customer 463001, June 12th, 2022
English 101
Good work.
Customer 453625, May 25th, 2022
Health Care
Thank you!
Customer 454001, March 11th, 2020
Good work. Thank you for following the instructions and the corrections, and making the necessary changes.
Customer 463679, March 3rd, 2023
Human Resources Management (HRM)
Good economics.
Customer 462499, May 1st, 2022
Customer 462815, April 20th, 2022
Religious studies
Always proofread before submitting to identify minor errors.
Customer 460547, April 2nd, 2022
Entertainment & Gaming
Customer 452441, April 29th, 2022
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat