Sunday, October 6, 2019

Biometric Identification and Privacy Implications Essay

Biometric Identification and Privacy Implications - Essay Example As compared to older technologies, the rate at which unique biometric identifiers can be inputted, reviewed, and confirmed dwarfs that of the way in which other personal markers of recognition have been stored and utilized in the past. One of the most effective biometric scans that work best to avoid/prevent security threats is that of the palm sensor. Within such a device, the individual fingerprints or palm prints of the individual are not scanned. Instead, it utilizes a complex sensor that determines the exact measurements of the hand or fingers as a means of ascertaining whether or not the individual has clearance to operate within a given role. Although such an approach is not immune to security threats, the overall level and complexity of the information that a hacker or leaker could pose would be somewhat minimal; as the measurements of a person’s hand or fingers alone are not sufficient to represent a clear breach of privacy. Other tactics, such as fingerprinting and/o r retinal scanning can easily be seen as a more â€Å"unique† identifier of an individual and as such represent a higher security threat in the case that the information is compromised, hacked, or unwillingly

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.