1 / 7

Biometric Security System | Concept N Content

With the emergence of new technology in the world, the security of oneu2019s privacy has become a very significant issue. People all around the world are using smartphones and are using various techniques to keep their smartphones more secure. People may put a unique pattern or even a password to unlock their phones. This is essential so that their information remains secure from others.

Download Presentation

Biometric Security System | Concept N Content

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Biometric Security System Concept N Content

  2. About Concept N Content • Concept N Content is technological blog where you can find all the latest updates regarding technology and much more • This Blog will help you explore world digitally • We will update our readers about current trending system and how can one get fit in digitally

  3. Why we need biometric security A smartphone user is exposed to various threats when he/she use their phones. These threats can disrupt the operation of the smartphone and transmit or modify user data. So, applications must assure the privacy and integrity of the information user handle. In addition, since some apps could themselves be malware, their functionality and activities should be limited (for example- blocking access to a user’s address book, sending SMS’s that are billed to the user, preventing transmission of data on the network, restricting the apps from accessing location information via GPS etc.).

  4. Targets for Attackers Targets Information/Data Availability Identity

  5. Types of Biometric Sensors Biometric sensors or access control systems are classified into two types, such as Physiological Biometrics and Behavioral Biometrics. Physiological biometrics mainly include face recognition, fingerprint, hand geometry, iris recognition, and DNA. Whereas behavioral biometrics include keystroke, signature and voice recognition. For a better understanding of this concept, some of them are discussed below.

  6. Pros & Cons Pros of using biometrics Cons of using biometrics • Lack of accuracy • Vulnerable to hackers’ attack • Improper functioning, resulting in inappropriate acceptance and rejections. • Expenses of setting up and maintenance of the biometric system. • Hard to fake • Secure and long lasting • Increased accountability • Increased convenience of the user • Easy to use • Require less database storage area.

  7. Contact Us Email ID: contact@conceptncontent.com Website: https://www.conceptncontent.com Instagram: https://www.instagram.com/conceptn_content/ Facebook : https://www.facebook.com/ConceptnContent Twitter : https://twitter.com/ConceptnContent

More Related