Free Essay

Biometrics

In:

Submitted By nadirabanuj
Words 1911
Pages 8
Biometrics

Presented by Ratna Sudha.R

CONTENTS

1. Introduction 2. Security and authentication 3. Methods of verification a. Psychological verification i. Finger Print. ii. Hand Print. iii. Face Measurement. iv. Retinal Scanning. v. DNA Analysis. b. Behavioral verification i. Typing. ii. Signature. iii. Voice. 4. Identification. 5. Verification. 6. Advantages 7. Limitations 8. Conclusion. 9. References

Introduction

Biometrics is an advanced technology for superb security and authentication .The very term "biometric” it represent that "bio" means related to the biological study and "metric " means something, which is related to measurement. In network environment security is a crucial factor. Provide security to pages in the network is to difficulty. Password is not a good measurement for security. Good security mechanism is necessary on the Internet. Security in different levels applies to various documents. Security is depends how security assign to documents. Security depends on following categories.

1. Confidential 2. Secret 3. Non-secret 4. Public

Confidential pages over the network provide full security. No way to tamper data in the page by third party. In this case biometrics are more useful and no way to disturb the page contents. First of all store all data about biometrics in database after that tally with this data. If tally satisfies with backend then provide access to the user. Collecting information is too difficult and store in database also need more space.

There are two security methodologies in Biometrics, they are

1.Token-based security: It relies on the users special item -token like card-id.

2.Secret based security: It relies on an individual secret id number like password.

Neither of the two can accurately determine whether the password that posses a token nor knows some secret information of the individual it represents. Tokens can be stolen and information can be guessed or fraudulently obtained.

Biometric is a technology where the password for entry is you, which identifies your psychological and behavioral characteristics.

Security and Authentication

Web-Based Enterprise Management (WBEM) supports a limited form of security for the Microsoft® Windows® 98 platform that involves validating a user's logon for the local machine and for remote access. A validated user is granted access to the entire Common Information Model (CIM) schema. WBEM does not secure system resources, such as individual classes, instances, and namespaces. Security is limited because Windows 98 is not a secure operating system and does not support file system or registry security. All security-related information is represented by instances of WBEM system classes located in the Root\Security namespace. These classes and instances can only appear in the Root\Security namespace and must remain there permanently. The WBEM Administrator application can be used to set permissions for WBEM users. It is similar to the User Manager application supplied with Microsoft® Windows NT®. In WBEM, all security accounts are referred to as subjects. There are two types of subjects: user and group. Users are represented by instances of the NTLMUser system class, which describes individual users. Groups are represented by instances of the NTLMGroup system class, which describes multiple users. Both the NTLMUser and NTLMGroup classes derive indirectly from the subject system class, an abstract class that is not intended to be used for instantiation. More directly, NTLMUser derives from the generic User class and NTLMGroup derives from the generic Group class.

Permissions:

Microsoft SQL Server uses permissions to enforce database security. The SQL Server permissions system specifies which users are authorized to use which Transact-SQL statements, views, and stored procedures. The

ability to assign permissions is determined by each user's status (as SA, database owner, or database object owner). Permissions are set on database users or groups, not on login IDs.

Permission Hierarchy:

SQL Server's permissions system recognizes four types of users: the SA, database owners, database object owners, and other users of the database. The different types of users exist in a hierarchy (explained in the following sections and illustrated below).

Only the SA and database owners can grant statement permissions to other users.

Different Security Mechanisms: To help you understand the information presented in this chapter, we begin by defining some security-related terms. This brief list of definitions is not intended to serve as a comprehensive SQL Server glossary. It is provided as a quick reference to help you understand some of the security elements discussed throughout this chapter. You may find it useful to refer back to this list of security definitions as you read through this chapter and through Chapter 9, "Managing Security." alias An alias is a database username that is shared by several login IDs. A database alias allows you to treat more than one person as the same user

inside a database, giving all of them the same permissions. Any username in a database can also serve as an alias. Aliases are often used so that several users can assume the role of database owner. Database object owner Database objects are tables, indexes, views, defaults, triggers, rules, and procedures. The user who creates a database object is the database object owner and is automatically granted all permissions on it. The database object owner can grant permission to other users to use that object. Database object ownership cannot be transferred.

database owner The database owner (DBO) is the creator of a database. There is only one DBO. The DBO has full privileges inside the database that he or she owns, and determines the access and capabilities provided to other users. In his or her own database, the user is recognized as DBO; in other databases, the database owner is known by his or her database username. DBO status can be reassigned to a different user. Only one login ID can be DBO, although other login IDs can be aliased to DBO. domain In Windows NT security, a domain is a collection of computers that are grouped for viewing and administrative purposes, and that share a common security database.

group In SQL Server, a database group is a collection of database users. The users receive the database permissions granted to the group. Using groups simplifies management of a large number of database users, because groups provide a convenient way to grant and revoke permissions to more than one user at the same time. In Windows NT, a group is a collection of Windows NT users. The users received the Windows NT rights and permissions granted to the group. Groups provide a convenient way to manage the capabilities of a large

number of users with similar needs, within the security scope of a domain or a computer.

integrated security Integrated security allows a SQL Server to use Windows NT authentication mechanisms to validate logins for all connections. Only trusted (multi-protocol or named pipes) connections are allowed.

login ID A login ID is a name by which a user is known to SQL Server. Login IDs are also referred to as logins. To log in to a SQL Server that is running standard security, a user must provide a valid login ID and password.

login security mode The login security mode determines the manner in which a SQL Server validates a login request. There are three types of login security: integrated, standard, and mixed.

mixed security Mixed security allows login requests to be validated using either integrated or standard security. Trusted connections (as used by integrated security) and nontrusted connections (as used by standard security) can be established.

object permissions Object permissions regulate the use of certain statements on certain database objects. They are granted and revoked by the owner of the object.

permissions Microsoft SQL Server uses permissions to enforce database security. The SQL Server permissions system specifies which users are authorized to use which Transact-SQL statements, views, and stored procedures. The

ability to assign permissions is determined by each user's status (as SA, database owner, or database object owner).
There are two types: object permissions and statement permissions. standard security Standard security uses SQL Server's own login validation process for all connections. To log in to a SQL Server, each user must provide a valid login ID and password.

statement permissions Statement permissions provide the privilege to issue certain Transact-SQL statements. Statement permissions are not object-specific. They can be granted only by the SA or the database owner. Statement permissions apply to these statements: CREATE DATABASE, CREATE DEFAULT, CREATE PROCEDURE, CREATE RULE, CREATE TABLE, CREATE VIEW, DUMP DATABASE, and DUMP TRANSACTION. Statement permissions are also called command permissions. system administrator The system administrator (SA) is the person responsible for the administrative and operational functions that are independent of any particular application, and is likely to be a person with a comprehensive overview of SQL Server and all its applications. Administering SQL Server typically includes such tasks as installing SQL Server; configuring servers and clients; managing and monitoring the use of disk space, memory, and connections; creating devices and databases; authorizing SQL Server users and granting them permissions; transferring data in and out of SQL Server databases; backing up and restoring databases; implementing and maintaining replication; scheduling unattended operations; monitoring and tuning SQL Server performance; and diagnosing system problems. The system administrator may also advise application designers about the data that already exists on SQL Server, make recommendations about standardizing data definitions across applications, and so on.

The system administrator operates outside the protection system, which means that SQL Server does no permission checking for the system administrator. The system administrator is also treated as the owner of whatever database he or she is using. Anyone who knows the SA password can log in and act as system administrator (unless the server is running in Integrated login security mode).

trusted connections Integrated security requires network protocols that support authenticated connections between clients and servers. These are referred to as trusted connections. The multi-protocol and named pipe protocols provide trusted connections.

Note that nontrusted connections (connections over other network protocols that do not support authenticated connections) must be handled by using SQL Server standard security.

username In SQL Server, a database username is a name assigned to a login ID for the purpose of allowing a user to have access to a database. The abilities a user has within a database depend on the permissions granted to the username (and to any groups the username is a member of).

In Windows NT, a username is the name by which the user is known to the domain, or to an individual Windows NT computer. A user logs on to a domain or computer by providing a valid username and password. The abilities of the user depend on the Windows NT rights and permissions granted to that username and to any Windows NT groups the username is a member of.

Method of Verification

1.PSYCHOLOGICAL VERIFICATION

Psychological Verification involves in the verification of the organs of the human being, which will have unique identification and does not match with others.

There are five types of verifications. These are:

I. Fingerprint. II. Handprint. III. Face measurement. IV. Retinal scans. V. DNA analysis.

I. Finger print: It involves the user placing his finger over a glass-plate, which resides over a high-resolution camera, which uses optical or electromagnetic means to take its snapshot. The software analysis your finger for pattern such as loops, worls and arches.

Advantages:

a. This technology is neither too expensive nor does it require extensive user training. b. It also simple to implement. c. Finger print system has FAR

Similar Documents

Free Essay

Biometrics

...Biometrics within Financial Institutions Abstract This paper presents a problem with the use of technology within the Credit Unions and Banking industries. Technological innovations have allowed the industry to be more open to consumers and challenges that the current economy has posed. Modern technology is also change the landscape of how, when and where business is conducted with financial institutions and consumers, businesses, and other organizations. Technology driven issues such as privacy, security and trust, have been pushed to the forefront, which makes the line between mobile banking and banking online increasing difficult to distinguish. Credit Unions like other banking institutions rely on gathering, processing, analyzing and providing information to meet the demands of the consumer. Given the importance of information systems within banking its not surprising to find, risks within the systems are developing in nature. History Truliant Federal Credit Union was started in Winston-Salem, North Carolina around 1952. They serve over 180,000 member owners and more than 900 business and organizations with $1.6 billion in assets. Truliant as it will be referred to in this paper has 21 financial locations in North Carolina, South Carolina, and Virginia. One philosophy that stands out or is a representation of what this particular Credit Union stands for is “ people helping people”. Like other not for profit organizations, they provide individuals and small business with...

Words: 1787 - Pages: 8

Premium Essay

Biometric

...springer.com/chapter/10.1007/978-3-642-01793-3_20 Eigenvalue estimation plays an important role in biometrics. However, if the number of samples is limited, estimates are significantly biased. In this article we analyse the influence of this bias on the error rates of PCA/LDA based verification systems, using both synthetic data with realistic parameters and real biometric data. Results of bias correction in the verification systems differ considerable between synthetic data and real data: while the bias is responsible for a large part of classification errors in the synthetic facial data, compensation of the bias in real facial data leads only to marginal improvements. https://www.eff.org/wp/biometrics-whos-watching-you September 14, 2003 September 2003 Introduction Among the many reactions to the September 11 tragedy has been a renewed attention to biometrics. The federal government has led the way with its new concern about border control. Other proposals include the use of biometrics with ID cards and in airports, e.g. video surveillance enhanced by facial-recognition technology. The purpose of this document is to sketch out EFF's concerns about biometrics. In today's public arena, biometric technologies are being marketed as a "silver bullet" for terrorism; however, very little independent, objective scientific testing of biometrics has been done. Deploying biometric systems without sufficient attention to their dangers makes them likely to be used in a way dangerous...

Words: 7685 - Pages: 31

Free Essay

Biometric

...Title (2) Biometric scanning system types and which one is more effectiveness in a workplace Biometric recognition, or biometrics, refers to the automatic authentication of a person based on his or her physiological or behavioural characteristics (Jain, Bolle, and Pankanti 1999a; Maltoni, Maio, Jain, and Prabhakar 2003). One of the most important technologies which acts as a human being identify required purpose. Nowadays there were great progresses in technology of access for companies which it using human being body to identify the identity of the person. In the past Human beings used fingerprint to identity for signature. Biometric technology looks like a revolution for modern society for example, Iris and AFIS (Automatic Finger Print Identification System). Although fingerprint has a good feature to identify people but I will argue that iris system has shown the best performance to do the required purpose of scanning and identification more accurately than fingerprint. Reliability Fingerprint is a biometric device by which the people been identified through scanning fingerprint of the person and save the data to store the fingerprint image. Furthermore fingerprint identification scanning is reliability because fingerprint identification and authentication is the mature biometric technology (Komarinski, 2005). Firstly, the fingerprint is reliable because it includes quite huge information and will keep for all life of human being, In spite of the fingerprint just...

Words: 1161 - Pages: 5

Free Essay

Biometrics

...the near future. It has been called ''biometrics". The pioneers of this new domain intend to construct devices which would allow identification of a person on the basis of his or her ''biological'' characteristics which is voice, movements, features of face and other parts of the body, retina or iris pattern. Nature has made human beings with different characteristics which may vary from one person to another. This property is made use of by Biometric technology to distinctly identify each person. This paper gives an overview of key biometric technologies and basic technique involved. The various opportunities for biometrics are mentioned, followed by the the benefits of the biometric and identification, the actual issue or current potential problems and abuses, and appropriate guidelines of identification and biometrics technology. Introduction Biometric technology involves effective methods of individual identification/authentication through its recognition of unique physiological characteristics. Although still a developing technology which contains deficiencies, it is generally considered to be a highly accurate and widely applicable security measure. However, growing public awareness of this technology has been accompanied by increasing concerns about ethical issues associated with its use. Biometric Systems Biometrics are automated methods of recognizing a person based on a physiological or behavior characteristics. Biometrics technologies are becoming the foundation...

Words: 268 - Pages: 2

Premium Essay

Biometrics

...the first biometric security systems appeared in the market, an increasing demand for novel techniques that will cover all different scenarios, has been observed. Every new method appears to outmatch some of its competitors but, at the same time, presents disadvantages compared to others. However, there is still no method that consists a single panacea to all different scenarios and demands for security. This is the reason for which researchers are on a continuous effort for more efficient and generic biometric modalities that can be used in various applications. In this chapter, emerging biometric modalities that appeared in the last years in order to improve the performance of biometric recognition systems, are presented. The presented methods are divided in two major categories, intrusive and non-intrusive ones, according to the level of user nuisance that each system sets off. 1 Introduction Biometric recognition is a well-known research area that aims to provide more efficient solutions to everyday growing human need for security. Biometrics refers to methods that can be used for uniquely recognizing humans based upon one or more intrinsic physical or behavioral characteristics. In information technology, in particular, biometrics are used as a tool for efficient and reliable identity management and access control. Biometrics are also used in surveillance applications in order to identify individuals. The last decade, a large number of novel biometric modalities...

Words: 12845 - Pages: 52

Premium Essay

Biometrics

...“Biometric attendance in the workplace is a threat to privacy”. How far do you agree? (30 marks) Ref - http://www.biometrics.org/html/introduction.html Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy...

Words: 665 - Pages: 3

Free Essay

Biometrics

...Optimization of biometric Fingerprint Recognition parameters using Genetic Algorithms Report submitted for CPSC - 6126 Fall 2014 Term Paper By Krishna Sindhuri Nagavolu 13th December, 2014 Optimization  of  biometric  fingerprint  recognition  parameters  using   Genetic  Algorithms   Abstract This research paper discusses about parameter optimization for biometric fingerprint recognition with the use of genetic algorithms. An accurate access control system is very important in domains like identification checks at airports, government organizations, FBI’s, scientific working groups like NASA, US defense department and driver’s license office. The main reason these organizations prefer Biometrics is because it measures physiological characteristics like fingerprints, iris patterns, facial recognition, retina recognition, ear recognition and DNA analysis. Based on the features of the biometric sensors used, the system can detect whether a person is an authorized user or not. Though there are many other methods for identification, biometric sensors are considered to be very reliable and accurate. The main objective of this paper is to build a fingerprint recognizer that is fully automatic and can minimize the errors caused while matching the fingerprints. Keywords: Biometrics, genetic algorithms, Parameter optimization, fingerprints                           2|Page Optimization ...

Words: 2966 - Pages: 12

Free Essay

Biometrics

...IB Extended Essay Subject: Computer Science / I.T.G.S Research Question – To what extent can biometrics be trusted as a safe method of payment in personal devices? Research Question – To what extent can biometrics be trusted as a safe method of payment in personal devices? Name: Rusheel Iyer School: GEMS Wellington Academy - Silicon Oasis Year 12 Word Count - ____ Name: Rusheel Iyer School: GEMS Wellington Academy - Silicon Oasis Year 12 Word Count - ____ Contents Title Page………………………………………………………………………………………………………..1 Abstract………………………………………………………………………………………………………….3 Introduction……………………………………………………………………………………………………4 Biometrics………………………………………………………………………………………………………4 Fingerprints…………………………………………………………………………………………4 What is a Fingerprint?..........................................................................................4 Why is it used?.........................................................................................................4 What is Fingerprint Recognition?...................................................................4 Facial Recognition………………………………………………………………………………..5 Why is it used?........................................................................................................5 What is Facial Recognition?..............................................................................5 How does it work?...................................................................................

Words: 1744 - Pages: 7

Premium Essay

Biometrics

...What is a Biometric Time and Attendance System? Biometrics is the identification of people based upon their physical characteristics; most commonly their fingerprints, hands, eyes, or facial features. While time and attendance systems are used to manage employee attendance, scheduling, and associated payroll tasks. Within time and attendance, biometric devices are often used as a punch clock in order to add an extra layer of security, accountability and efficiency. How Does Biometric Time and Attendance Software Work? Step 1: Biometric Devices: Using biometric time and attendance systemsallows employees to clock in and out using their fingerprint, retinal scan, etc. Often times this process is also accompanied by a PIN (Personal Identification Number) which must also match the fingerprint or other scan. Step 2: Time and Attendance Software: Pairing your biometric device with a time and attendance software allows for more efficient payroll and attendance processing. Rather than spending hours adding up manually submitted clock-in and clock-out times, your biometric time and attendance software will allow you to automatically import data into your payroll software. This will significantly cut down on processing time and will eliminate errors derived from manually inputting information. Different Types of Biometric Devices Fingerprint Scanners are probably the most common type of biometric time and attendance device, simply because they are easy to use and are generally quite...

Words: 573 - Pages: 3

Free Essay

Biometrics

...Biometrics and finger/palm printing Tara Tatum Team C Introduction In many of the FBI’s high profile cases, one form of technology that has become highly effective is biometrics. The definition of biometrics is the science of measuring and statistically analyzing biological data. This scientific measuring tool is mostly used in identifying individuals whether anatomical or physiological. While fingerprinting is probably one of the oldest and most common forms of biometrics, other forms can include but are not limited to iris scans, voice recognition, palm prints, and facial recognition. As of late, the FBI, being a leader in the latest biometric technology, has created with the help of the science and technology branch, the Biometric Center of Excellence or BCOE. Not only has the BCOE strengthened the FBI’s abilities by proving the guilt, as well as the innocence of those convicted of crimes, but it has also been effective in thwarting terrorism that plagues many countries today. Finger/palm printing techniques Since the early 1920’s, fingerprinting techniques have been in existence, assisting in identifying and authenticating a person’s identity. This older form of biometric technology has both advantages and disadvantages. Some of the advantages can be the authentication of one’s identity, as no two person’s have the same prints, the cost effectiveness, the ease of use, the accuracy and the standardization. Some disadvantages are the intrusiveness, as some...

Words: 776 - Pages: 4

Premium Essay

Biometrics

...Biometrics involves the automatic, real time identification of individuals based on their physiology or behavior (Grant & Terry, 2012). Biometrics include a wide range of technologies that include facial recognition software, DNA profiling, voice recognition, fingerprint identification, and retinal scanning. The benefits of any technology are significantly dependent on the quality of the data base that are used to result in preventing crime. Facial recognition technologies can distinguish suspects and improve security and officer safety. Facial recognition is different from other biometric techniques that are used for surveillance purposes. Searching for wanted criminals, suspected terrorists, and missing children are benefits of the facial recognition seeing as it can be done from far away. This ensures that there is no contact with the subject and they remain unaware that they are being scanned. Fingerprint identification requires an individual to roll each finger across a fingerprint scanner. This typically takes several minutes and do not capture any other imprints of the hand, which are often found at crime scenes. Fingerprint identification is one of the most well known and publicized biometric. This is one of the most popular because it has numerous sources, the ten fingers, and the ease of access. The offender databases include offender photos, fingerprints that have been obtained, and images of distinguishing marks such as scars, tattoos, and other body modifications...

Words: 332 - Pages: 2

Free Essay

Biometrics

...already arrived in New York — but it’ll take a whole lot more than a new pair of peepers to trick this setup. An Israeli general is at work on a “biometric security” system that he believes will have New Yorkers tossing out their keys and maybe ditching their doormen, too. Using sophisticated scanners that can recognize a person’s face, voice, build and stride, the system can unlock your door in under two seconds. Any strangers not in the database will be denied access. “This is only the beginning,” says General Aharon Farkash, the founder and president of the firm FST21. “This is the way people will enter buildings in the 21st century.” To help establish FST21 in the states, Farkash opened a North American office earlier this month at 7 World Trade Center. Should you drop by, you’ll be greeted by one of its security devices. But unless he’s beamed a code to your phone or you work there already, there’s no convincing the small 8-inch scanner to let you in. The device looks simple on the outside, and in practice it is, essentially turning everyone into a human-size key. “Just like a fingerprint, we all look and act in a unique way,” Farkash says. “Biometric” technology has been around since the 1970s, and is often seen in thumb-print readers and retinal scanners. But thanks to less-invasive techniques, biometrics is starting to take off. “People have been talking about this for decades as the future, but I think the technology is finally good enough and invisible...

Words: 1150 - Pages: 5

Premium Essay

Biometric

...Biometrics in Schools, Colleges and other Educational Institutions The following guidance has been prepared as an aid to schools, colleges and other educational institutions that may be considering the installation and use of a biometric system. This document is intended to encourage such institutions to fully consider if there is need for a biometric system in the first place and then to assess the privacy impact of different systems. The critical issues to be considered from a data protection perspective are the proportionality of introducing a biometric system and the requirement to obtain the signed consent of the student users (and their parents or guardians in the case of minors) giving them a clear and unambiguous right to opt out of the system without penalty. The document is not intended to promote any particular system, but is intended to make schools and colleges aware of their responsibilities under the Data Protection Acts 1988 & 2003. It is the use of a biometric system that may give rise to a data protection concern, not necessarily the production or sale of a system. All situations must be judged on a case-by-case basis. 1. Different types of Biometric systems All biometric systems operate on the basis of the automatic identification or authentication/verification of a person. What differs between systems is the nature of the biometric and the type of storage. 1.1 Information used to generate biometric data Biometric data may be created from physical or physiological...

Words: 3989 - Pages: 16

Free Essay

Biometrics

...3-20-14 Biometric Scan Technologies This essay covers the basic history, importance, and impacts biometric technologies have on our security, and what the future may hold because of them. When speaking of biometrics, fingerprinting is usually the first biometric method most people consider. However, throughout the years, biometric technology has advanced and accrued new methods such as facial recognition and iris scanning. First off, we will discuss finger-scanning, or fingerprinting, as it is the oldest and most commonly used form of biometrics to date. This technology has always fascinated me because it identifies every individual based on their unique fingerprint, making it very difficult to replicate or bypass. An average scan can identify up to, but not limited to, 40 unique characteristics called “minutiae” a term coined by the FBI years ago. If that is the current ability of a fingerprint scanner, I can only imagine that in the future this method of biometrics will be the standard for consumer securities. Homes will have touch pads instead of keys, making the likeliness of a burglary slim to none. So, in the future fingerprinting won’t be limited for the elite and three letter agencies. Secondly, facial recognition biometric technology is gaining popularity, especially in modern social devices such as smart phones, tablets, and laptops. Although this method has much higher goals, it currently stands as an efficient means of security. Again, biometrics has always...

Words: 477 - Pages: 2

Premium Essay

Biometrics

...Biometrics 125 years ago, winter 1879, Paris First agency police prefecture clerk Alphonse Bertillion was sitting in dark cold corner of huge file-cabinet room, where there were stored files on all Parisian criminals. A.Bertillion was entering the criminals’ description. He found out that there is no classification system, since: a) Criminals could easily change their names, and attempts to try different systems (by age, criminal method) end up in failure. Bertillion, son of Lui Bertillion – president of the Anthropological society, came up with an idea to utilize anthropological parameters (height, length and volume of the head, length of the hands, fingers, etc.) to identify personality. This was a break-through in criminalistics. With the development of electronics, Bertillioon’s theory was recalled and scientists realized that human beings have numerous unique characteristics beginning from the iris of the eye to the fingerprints and all these characteristics can be used in personality identification. With the rapid development of computer technologies, the concept of information security is becoming more and more important. Crime scene investigators have been using behavioral and physical characteristics for centuries in order to identify the criminals, nowadays; we have a great need for identification and authorization in information security. Information Security is being understood as a protection of the information and informational infrastructure...

Words: 1934 - Pages: 8