Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Principles of Information Security
Principles of Information Security
Management Of Information Security, 2/E
Management Of Information Security, 2/E
Hi-index | 0.00 |
Today, everyone from fans of baseball games having their faces scanned and matched against a database of criminals to little kids at school using their thumbs to purchase their daily lunches, biometric technology is rapidly becoming a part of our everyday lives. With the advance in Information technology there has been an increase in threats to the system and its assets and therefore there has been a need to improve the security measures. The need for more and more reliable user authentication techniques has increased concerns about security and rapid advancements in networking, communication, and mobility in these days. Biometrics is one such authentication method which helps verify the users of the system. Biometric technologies are becoming the foundation of a highly secure identification and personal verification solutions. To ensure the integrity and confidentiality of its system it is necessary for every organization to have a good Security Policy. Security policy is an important factor to help secure the system, but by itself it will not help secure an information system [8].