< Day Day Up > |
In the previous chapters, we explored finger, face, voice, and iris biometrics. We examined each biometric's strengths and weaknesses, and we looked at what types of algorithms are available. Also, Chapter 4 described the qualities that make a biometric technology good for network security. Now that we have examined both the biometrics that could be suitable for network access and their qualities, a recommendation of which technology to use needs to be made. The recommendation put forth here is made with the best technologies available at the time. As biometric technology advances, some of the analyses here will need to be revisited. What will remain solid is the methodology used to evaluate which biometric system best meets the needs for network security. Chapter 4 outlined the following as characteristics of a good biometric for network security:
For the biometrics examined, a score of 0 to 10 was assigned for each characteristic. An ideal biometric was defined as having a perfect score of 10 in each category. What follows is the examination of each biometric type and the reasoning for the scores it received. |
< Day Day Up > |