10 May 2022

118

Cyber Security- Biometric Technology

Format: APA

Academic level: College

Paper type: Research Paper

Words: 517

Pages: 1

Downloads: 0

Research Proposal

Increased connectivity and communication that has resulted from the development of Internet technology is a factor that has led to an increase in concerns for security. Internet use and application for online shopping, banking, e-commerce and other transactions have to be secure amidst an ever rising cyber-crime rate in the global spectrum (Fatima, 2015). However, the ordinary person cannot be restricted in their use of the advanced technologies that enable transactions and communication much easier than in earlier years. Cyber security is, therefore, an important aspect of the daily activities of most people. Most banks, financial companies, and retailers have switched to biometric technology as the primary means by which they can protect their consumers from cyber-crimes. Biometric technology is one that uses the fingerprints of an individual to authenticate their transactions thereby safeguarding them from possible cyber-attacks that may occur. The markets are also using biometrics with applications available in the market that use facial recognition, fingerprint recognition or even iris recognition. 

Cyber security mainly entails authentication, authorization, and identification which are the main ways in which the role of the applications and systems that safeguard individuals. Vacca (2013) suggests that biometric systems are important in verification where the companies can ascertain the users of their applications in transactions. While the identification process would involve a complicated process that compares the fingerprint to a database of many other print identities, the verification process is one in which the biometric applications already store an identity that is compared with what the user keys in (Kour, Hamandlu & Asari, 2016). This research, therefore, hypothesizes that biometric application is a solution to cyber security which entails the use of distinct personal characteristics to enable identification, authorization of the user or verification through a technology that can store memory of the distinguishing differences between individuals that access certain technologies. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Method of inquiry

In this research, we require data from digital security companies, technology industries as well as financial corporations which entail some of the largest consumers of the cyber security products. Most of the enterprises that rely on cyber security technology such as biometrics usually keep their customer information confidential. In this research, however, the primary concern is the application of the biometrics technology in their activities and the role of the technology in enabling a safer working environment within these industries. Therefore, we will use a mixed approach where we will gather quantitative as well as qualitative data to inform the research. 

Owing to the history of fingerprint recognition, our research will be a survey of the digital industry related with ecommerce, data security and corporations directly dealing with cyber security. Some of the main concerns of the study will be; 

Who are the main types of consumers who need and use biometric technology?

What numbers of companies or entities have purchased the technology?

How are the quality assurance requirements met by the companies involved with the production of this technology?

Why is the biometric system better than other technological options for cyber security regarding authorization, identification, and authentication? 

Conclusions  

Within these constructs, the paper will explore the biometric system technology with the aim of acquiring more information concerning cyber security. Furthermore, the research will focus on the possible quality controls and regulations as well as the opportunities for improvement that may exist in the cyber security industry.

References

Kour, J., Hanmandlu, M., & Ansari, A. Q. (2016). Biometrics in cyber Security.  Defense Science Journal 66 (6), 600-604.

Fatima, A. (2015). E-Banking Security Issues? Is There A Solution in Biometrics?.  The Journal of Internet Banking and Commerce 2011 .

Vacca, J. R. (2013).  Cyber security and IT infrastructure protection . Amsterdam: Syngress.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Cyber Security- Biometric Technology.
https://studybounty.com/cyber-security-biometric-technology-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 70

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 437

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 112

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration