18 Oct 2022

60

The Benefits and Risks of Biometrics Security

Format: APA

Academic level: College

Paper type: Research Paper

Words: 604

Pages: 2

Downloads: 0

Types of Biometrics 

Every industry across the world has adopted biometrics as a critical technological approach to dealing with security issues affecting companies and organizations, which opt for different types of biometrics. The most common types of biometrics used today include eye-iris or retina, face, fingerprint, signature, voice, and hand geometry recognition. Companies often consider the value that biometrics may provide for them in terms of improving security, advancing identification, and preventing unauthorized access. When comparing each of the biometrics indicated, it can be argued that they are each accurate in achieving their intended purpose, which is the identification of a user. Gavrilova, Ahmed, Azam, Paul, Rahman, Sultana, and Zohra (2017) indicate that continued use of biometrics serves as a guarantee of system security, as it helps avoid unauthorized access to systems for persons with biometrics that do not match those stored in the system. From this perspective, it can be argued that none of the biometrics is better or realistic compared to others.

Characteristics of Biometric Identification 

Biometric identification involves capturing an item of biometric data to ensure that an individual is identified with ease. Biometrics are unique physical characteristics that help in verification of an identity claim (Haas, 2019). Continued use of biometrics is seen as effective in preventing any underlying security concerns, as biometrics are unique to every individual. For example, a system that uses fingerprints as part of advancing an identity cannot identify two individuals using the same identity. The system takes into account the fingerprint patterns because every individual has a unique pattern that cannot be replicated. Therefore, this shows the extent to which biometric systems can improve on matters of security in claiming an identity. Another essential characteristic of biometric identification is that it establishes a front for identification, as individuals can be identified digitally. An individual's biometric information is stored in digital systems, which are then used for the sole purpose of identification.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Advantages of Biometrics Identification 

The first advantage of biometrics identification is that it creates a much more advanced platform for security. Biometrics offer unique individual identification with 100% accuracy making it nearly impossible for any individual intending to gain unauthorized access. From this perspective, it is clear that biometrics identification has been of great importance to improving security. The second advantage of using biometrics identification is that it offers convenience for users. Biometrics are easy to install and play a critical role in reducing paperwork considering that one is only expected to use his/her biometrics for identification (Kashyap, 2019). When compared to other types of security, biometrics identification is considered as one of the most effective security systems. Lastly, biometrics identification establishes accountability for every individual because one is always expected to make use of his/her biometrics when intending to gain access. That reduces the possibility of fraud, considering that every person will be accountable for his/her biometrics.

Privacy and Security Concerns 

The rapid evolution of fraud capabilities introduces privacy and security concerns when using biometrics identification. The most significant concern raised about biometrics identification is data security. Data networks and databases are prone to hacking, which may result in data losses. Similarly, biometrics data systems also face a high likelihood of hacking, which may result in loss of biometric data. Once an individual has enrolled his/her biometrics, they are stored in a database, which increases the vulnerability to possible external attacks likely to result in third-party access to these security systems. Security experts have been at the forefront in highlighting the vulnerability of biometric identification systems, with the view being that most of these systems face higher risks of unauthorized access resulting from hacking (Yang, Wang, Hu, Zheng, & Valli, 2019). Therefore, hackers with the capability of hacking into these security systems are in a much better position to access the systems using stolen biometrics.

References 

Gavrilova, M. L., Ahmed, F., Azam, S., Paul, P. P., Rahman, W., Sultana, M., & Zohra, F. T. (2017). Emerging trends in security system design using the concept of social behavioural biometrics. In  Information Fusion for Cyber-Security Analytics  (pp. 229-251). Springer, Cham.

Haas, E. P. (2019). Back to the Future: The Use of Biometrics, Its Impact on Airport Security, and How This Technology Should Be Governed.  J. Air L. & Com. 84 , 459.

Kashyap, R. (2019). Security, Reliability, and Performance Assessment for Healthcare Biometrics. In  Design and Implementation of Healthcare Biometric Systems  (pp. 29-54). IGI Global.

Yang, W., Wang, S., Hu, J., Zheng, G., & Valli, C. (2019). Security and accuracy of fingerprint-based biometrics: A review.  Symmetry 11 (2), 141.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). The Benefits and Risks of Biometrics Security.
https://studybounty.com/the-benefits-and-risks-of-biometrics-security-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 69

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 436

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 111

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration