Tuesday, April 23, 2019

DQWeek 5 technology essay Example | Topics and Well Written Essays - 1000 words

DQWeek 5 technology - Essay ExampleIn fact, it is anticipate that this technology will become much persistent in every business as comfortably as personal lives. At the present, the implementation of biometric enfranchisement technology advise be seen all near our lives for example at homes where normally an active biometric authentication sensor is phthisisd. When children return home and make subprogram of the biometric sensor after playing in the mud and dirt whole day. In this scenario, this sensor open fire detect the dirt in hidden areas of the body to suggest much better wash. In the future, the use of biometric authentication sensor can be expected for car system where a family hoping to go anywhere. In this scenario, children will not be able to ignite the car without parents authentication to start the car (Reid, 2003 Kaschte, 2005). on that point might be some disadvantages of this technology exclusively its advantages are so important and people indirect reque st to benefit from them that the disadvantages will be more and more reduced in the future. In short, it can be said that the applications of biometric authentication technology will increase to a greater extent in the future. In fact, this technology will be supported among a variety of equipment by the some enhancement of the technologies and the decrement in the prices for software and hardware. In the future, it is expected that the biometric authentication will be used in miscellaneous other areas of life such as ATMs, PDAs, access to Personal Computers and mobile phones, access to cars and buildings, DRM systems and many more we cannot even imagine (Kaschte, 2005 Bhattacharyya et al., 2009). From the above discussion it has been clear that the future of biometric authentication technology is bright but a number of protective cover attacks on biometric authentication technology would also be increased in the future. It is possible that in future new and more sophisticated te chniques emerge for breaking in biometric authentication systems. It is expected that in the future there will emerge a number of techniques that can be used to evade this technology (Waqas, 2009 Riha & Matyas, 2000). Moreover, some researches show that biometric systems are not ideal for security and as a result sometimes serious terminations and errors can occur. In fact, with this technology it is possible that an authorized individualistic can be rejected by the system or that a non-authorized individual can be able to get authentication into the system. In the future, a variety of vulnerability techniques can be generated for biometric attest systems that can include fraud by incorporating some fooling and fraudulent methods (Waqas, 2009 Riha & Matyas, 2000).. Furthermore, another major issue with biometric authentication system is lack of support for platforms and systems. In fact, this kind of support is extremely limited and received standards are not properly followed. In this scenario, there can emerge a number of security attacks. In addition, it can lead to a great deal drastic situation where an attacker can smash the overall security of the system (Waqas, 2009 Riha & Matyas, 2000). DQ2 Sec Products Find a commercial or shareware fruit related to this weeks topic, describe how it works, and discuss its security. This section presents an overview of the telecom system security. For telecom system security the egis of telecommunications applications and systems is a significant scenario for numerous causes.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.