Thursday, March 10, 2011

Biometrics

In today’s world, security is one of the biggest topics in the technology world.  We have come a long way from physical computer locks on computers and passwords.  Since the beginning of time it has always been a necessity to keep our belongings safe.  Whether keeping out a burglar or your little brother, the security of one’s property has always been a priority through the ages.  One of the newest ways to deter people from being able to access our personal and sensitive information is biometric technology. Biometrics is one of the most sophisticated fields of security. It requires a password that is one of a kind and is made at birth such as a finger print, voice command, or a retinal scan.

<iframe title="YouTube video player" width="480" height="390" src="http://www.youtube.com/embed/Aml2zUjulho" frameborder="0" allowfullscreen></iframe>

Bibliography
AuthenTec; AuthenTec Selected to Provide Identity Management Software for HP Consumer Notebooks, Opens New Online Store for Fingerprint Sensor Products. (2011, February). Computers, Networks & Communications,164.  Retrieved March 3, 2011, from Sciences Module. (Document ID: 2267624811).
This describes the implementation of biometric technology in to HP laptops such as the one I have. This source is reliable because it was found using proquest.

Wickins, J.. (2007). The ethics of biometrics: the risk of social exclusion from the widespread use of electronic identification. Science and Engineering Ethics, 13(1), 45-54.  Retrieved March 3, 2011, from ProQuest Science Journals. (Document ID: 2137608661).
This discusses the social and ethical problems people have with biometrics. This was found off the Mason databases.

Ravi Das.  (2005, July). An Introduction to Biometrics. Military Technology, 29(7), 20-27.  Retrieved March 4, 2011, from Military Module. (Document ID: 897846911).
This talks about how the military uses biometric technology to keep sensitive information safe.  This was used for the security part of my paper. This source was found using proquest.
Walter, C. M. (2005). How biometrics keep sensitive information secure. Nursing, 35(5), 76. Retrieved from EBSCOhost.
This source was used to talk about how biometrics keeps sensitive information secure. This source was found on the Proquest database.

Beyond passwords--biometrics and you. (2005). Chartered Accountants Journal, 84(5), 71-72. Retrieved from EBSCOhost.
This talks about how biometrics has evolved from passwords and is revolutionizing the security world. This source was found on the Proquest database.

No comments:

Post a Comment

Please add to advantages and disadvantages of technology. Also, please share your experience with the technology.