“Section's Engineering Education (EngEd) Program is dedicated to offering a unique quality community experience for computer science university students."
Apache License 2.0
363
stars
889
forks
source link
[Security] Future Vulnerabilities of Biometrics #5659
Biometric concept uses combination of algorithm and pseudocode which is generated by automated systems to give identity based on biological and behavioral features. These biological technologies involves fingerprint, voice-recognition, face recognition and retina scanner. The biometric technologies are stored in a specific file (like the database), which is later used to match the identity of the owner. Incase hackers get access to these file, they can easily extract information within these file to match the identity of the owner without there consent, which is insecure and makes data to be vulnerable, hence compromises the confidentiality integrity and availability of information.
Key takeaways
biometrics
Types of biometrics
Storage of biometrics
Vulnerabilities
Article quality
The concept will be theoretical with evidence to proof the whole idea.
Topic Suggestion
Future Vulnerabilities of Biometrics
Proposed article introduction
Biometric concept uses combination of algorithm and pseudocode which is generated by automated systems to give identity based on biological and behavioral features. These biological technologies involves fingerprint, voice-recognition, face recognition and retina scanner. The biometric technologies are stored in a specific file (like the database), which is later used to match the identity of the owner. Incase hackers get access to these file, they can easily extract information within these file to match the identity of the owner without there consent, which is insecure and makes data to be vulnerable, hence compromises the confidentiality integrity and availability of information.
Key takeaways
Article quality
The concept will be theoretical with evidence to proof the whole idea.
References
N/A