A STUDY OF INTERNET THREATS, AVOIDANCE AND BIOMETRIC SECURITY TECHNIQUES - COMPARISON OF BIOMETRIC TECHNIQUES
Abstract
In today’s IT world, most of the communication is done through networking. So, security of information is very crucial. A lot of techniques have been developed for security which involves passwords, encryption, digital signatures etc. But there are chances of vulnerabilities in these techniques and hackers can break the security algorithms of these techniques. So, in this era, researchers have moved towards biometric techniques of security. It involves identification of people based on their physical characteristics or psychological behaviors. A choice of biometric method to be used is made depending on the level of security required and the goals of the system. Biometric identification is very excellent and secure way of authenticating people. But it can also suffer from security threats, if proper design considerations are not taken into account. This work presents details of biometric techniques and a detailed comparison of most famous biometric techniques.
Refbacks
- There are currently no refbacks.