Computer Security Essay

2637 words - 11 pages

Biometrics is now becoming more popular with the introduction of information technology. This technology is used to verify and/or identity someone using his or her own unique physical patterns, for example fingerprints, facial recognition, iris scanning, retinal scan and hand geometry or behavioural patterns such as voice, keystroke dynamics and signatures (See Appendix 1). Until recently, biometrics was considered intrusive and too expensive for most companies, but now with the need for increased security, the dropping of prices and the improvement in technology more organisations are looking towards biometrics to replace current tasks for example swipe card and password confirmation. It can also be used to keep track of time and attendance within a company. Biometrics has also been introduced to some countries to ensure the integrity of their voting system.Although biometrics is something that some may consider being something of the future and they may not come across it, this essay will show that it is already used within some aspects of work and various testing within other fields that are ongoing. Especially since the attack on the twin towers, information and identity are two fields in which the government feels should be protected to help in the fight against terrorism, "A computer based attack on the national infrastructure could cripple the nation more quickly than a military strike." (Robin Cook, March 2001).Intense competitive pressures and razor-thin margins in the airline industry, as in many other industries, do not allow firms the luxury of freely expending resources to improve levels of service. Rather, the trick is to constantly seek ways to simultaneously achieve leaps in service quality as well as efficiency. Internet technology has in the last few years allowed many firms to do just that, and has redefined several service-oriented industries such as retail financial services, insurance, book and music retailing, and travel agencies. Biometrics may be the next major technology after the internet enabling further value and productivity enhancements for those firms that know how to harness its power (Wirtz and Heracleous, 2005).Biometrics is the authentication or the identification[1] of individuals based on a physical characteristic or trait. Physical characteristics include fingerprints, facial recognition, hand geometry or iris configuration; and traits include signature formation, keystroke patterns or voice recognition. Biometrics, as something you are, is both more convenient and more secure than something you know (passwords or pieces of personal information) or something you have (card keys, smart cards or tokens). There is no risk of forgetting, losing, copying, loaning, or getting your biometrics stolen, especially if a multi-biometric approach is used for authentication. Dominant security-enhancement technologies leave a lot to be desired. In addition to security risks, has been estimated that between half to a third...

Find Another Essay On Computer security

Computer Security Since 2001 Essay

2099 words - 8 pages INTRODUCTION Computer security is now an important area for any network administrator, systems analyst, information technology technician, databases administrator to the computer scientist. Although this list shows the professionals dabbling in Information Technology, it should not be misconstrued that the average computer user at home should not be concerned about computer security. A computer, be it a personal computer, a laptop or a simple

Computer Networking Security Essay

933 words - 4 pages that the ordinary, average user faces can easily be resolved through basic “home remedies” that technical savvy computer professionals use. Everyone can be a computer networking genius with some basic training. There are several computer networking problems that the most basic user usually has on a regular basis. These range from phishing, viruses, data loss, bad or no security passcodes, disconnection from the network, and operational startup

Computer Security in business

665 words - 3 pages Computer Security Legislation in Major IndustriesComputer security refers to a method of protecting data from being accessed, modified, used, revealed, or disrupted by unauthorized persons or organizations. There are three core principles of information security namely, confidentiality, integrity, and availability.Breach of information is what happens whenever certain information is captured by unauthorized party. This may occur accidentally or

Computer Security: Social Networking

1624 words - 6 pages Computer Security: Social Networking Social networks like Facebook, Twitter, and LinkedIn memberships are growing daily. Facebook being the largest with over five hundred million active users, from which fifty percent logon daily (Bamnote,Patil,Shejole, 2010, p.151). With the raise in these social networking websites the potential for an attack also raise. With the overwhelming amount of data stored on the internet the amount of effort needed

Security in the Computer World

1434 words - 6 pages INTRODUCTION The main purpose of security is to protect assets. Looking back into history, the big walls acted as a safeguard to a fortress or a kingdom. There were massive and strong doors which stopped any perpetuator from entering without permission. The same thing applies in the computer world, with the only difference being that it's virtual. There are closed networks and open networks. The closed networks are available for a person who

The Necessity of Computer Security

1743 words - 7 pages application of cryptography for civilian purposes is not just a right, but is also a necessity. Increasingly in today's era of computer technology, not only banks but also businesses and government agencies are turning to encryption. Computer security experts consider it best and most practical way to protect computer data from unauthorized disclosure when transmitted and even when stored on a disk, tape, of the magnetic strip of a credit card. Two

Incident Response: Computer Security System and Data

1089 words - 5 pages 3.6 Incident Response Incident response is the method for dealing with the security of a computer system when there is an attack. Incident response activities include incident verification, analyzing and containing the attack, collecting and preserving data, fixing the problem, and restoring services. Hence it is very essential to revise the organization's incident response plan and ensure that the differences between the computing environment

National Security/Computer Security

1057 words - 5 pages The government is using programs like Project Prism, which many have probably never heard of, in order to “protect” its national security. The program was created in 2007 by the Bush administration as a means to uphold national security against terroristic activities. The program uses social media as well as phone records in order to keep tabs on those they feel are involved in terroristic or criminal activity, but has since become a means for

Hacking as a Means of Identifying Weaknesses in Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later

The Use of Hacking to Identify Weaknesses in Computer Security

1740 words - 7 pages Introduction The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type

Global Distribution Inc.'s Security Policy Regarding Computer Usage

1741 words - 7 pages Acceptable Use Policy Purpose --The purpose of this policy is to detail acceptable computer usage at Global Distribution Inc. Adhering to acceptable usage standards protects the user and the company from potential attack. Scope -- This policy applies to all personnel associated with Global Distribution Inc., whether permanent personnel, temporary, or contractor. This policy applies to all equipment owned and operated by Global Distribution Inc

Similar Essays

Computer Security Essay

540 words - 2 pages NOT TOO INDEPTH BUT COVERS BASICS -The book Computer Security written by Time Life Books, explains what computer security is, how it works, and how it affects peoples lives. Without computer security peoples private information can be stolen right off their computer.Computer security is exactly what it sounds like. It is security on a computer to prevent people from accessing a computer. It is very difficult to secure a computer for a computer

Computer Security Essay

546 words - 2 pages Define computer security (2mks)Computer security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. The ability of a system to protect information and system resources with respect to confidentiality and integrityOutline the goals of computer security (5mks)- Confidentiality: verifying that information is private and therefore seen and accessed only by intended

Computer Security Essay

1948 words - 8 pages information and create security plans that will meet this new challenge. Computer security controls work with a different set of variables than those used for mainframes and LANs. For example, control over program changes, data security, system documentation, backup, recovery plans, and system testing are inherent in most mainframe (LAN) environments. However, desktops, laptop, and handheld computer systems seldom have this protection. One of the most

Computer Security Essay

3255 words - 13 pages Computer Security In the last few decades, the world saw a revolution in information and technology, and the main factor of this revolution was the computer. Computers made life easier for millions of people all over the world, especially in the United States, where the latest innovations in the field of computers take place. Information circulates with extreme speed, and a person with a computer and access to the Internet can follow what