Wednesday, July 24, 2019
DQWeek 5 technology essay Example | Topics and Well Written Essays - 1000 words
DQWeek 5 technology - Essay Example In fact, it is expected that this technology will become more persistent in every business as well as personal lives. At the present, the implementation of biometric authentication technology can be seen all around our lives for example at homes where normally an active biometric authentication sensor is used. When children return home and make use of the biometric sensor after playing in the mud and dirt whole day. In this scenario, this sensor can detect the dirt in hidden areas of the body to suggest much better wash. In the future, the use of biometric authentication sensor can be expected for car system where a family hoping to go anywhere. In this scenario, children will not be able to ignite the car without parentsââ¬â¢ authentication to start the car (Reid, 2003; Kaschte, 2005). There might be some disadvantages of this technology but its advantages are so important and people want to benefit from them that the disadvantages will be more and more reduced in the future. In short, it can be said that the applications of biometric authentication technology will increase to a greater extent in the future. In fact, this technology will be supported among a variety of equipment by the some enhancement of the technologies and the decrease in the prices for software and hardware. In the future, it is expected that the biometric authentication will be used in various other areas of life such as ATMs, PDAs, access to Personal Computers and mobile phones, access to cars and buildings, DRM systems and many more we cannot even imagine (Kaschte, 2005; Bhattacharyya et al., 2009). From the above discussion it has been clear that the future of biometric authentication technology is bright but a number of security attacks on biometric authentication technology would also be increased in the future. It is possible that in future new and more sophisticated techniques emerge for breaking in biometric authentication systems. It is expected that in the future there will e merge a number of techniques that can be used to evade this technology (Waqas, 2009; Riha & Matyas, 2000). Moreover, some researches show that biometric systems are not ideal for security and as a result sometimes serious issues and errors can occur. In fact, with this technology it is possible that an authorized individual can be rejected by the system or that a non-authorized individual can be able to get authentication into the system. In the future, a variety of vulnerability techniques can be generated for biometric authenticated systems that can include fraud by incorporating some fooling and fraudulent methods (Waqas, 2009; Riha & Matyas, 2000).. Furthermore, another major issue with biometric authentication system is lack of support for platforms and systems. In fact, this kind of support is extremely limited and current standards are not properly followed. In this scenario, there can emerge a number of security attacks. In addition, it can lead to a great deal drastic situa tion where an attacker can smash the overall security of the system (Waqas, 2009; Riha & Matyas, 2000). DQ2: Sec Products Find a commercial or shareware product related to this weeks topic, describe how it works, and discuss its security. This section presents an overview of the telecom system security. For telecom system security the protection of telecommunications applications and systems is a significant scenario for numerous causes.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.