Chapter 9. Recommended Biometric for Network Security

 <  Day Day Up  >  

In the previous chapters, we explored finger, face, voice, and iris biometrics. We examined each biometric's strengths and weaknesses, and we looked at what types of algorithms are available. Also, Chapter 4 described the qualities that make a biometric technology good for network security. Now that we have examined both the biometrics that could be suitable for network access and their qualities, a recommendation of which technology to use needs to be made.

The recommendation put forth here is made with the best technologies available at the time. As biometric technology advances, some of the analyses here will need to be revisited. What will remain solid is the methodology used to evaluate which biometric system best meets the needs for network security.

Chapter 4 outlined the following as characteristics of a good biometric for network security:

  • Users willingly accept the biometric device

  • Users find it easy to use

  • Total technology costs and benefits provide a suitable ROI

  • Technology is deployable and supportable

  • Technology is not invasive and requires the user to actively submit to its use

  • Technology is mature and reliable

  • Users become habituated quickly to the device

For the biometrics examined, a score of 0 to 10 was assigned for each characteristic. An ideal biometric was defined as having a perfect score of 10 in each category. What follows is the examination of each biometric type and the reasoning for the scores it received.

 <  Day Day Up  >  


Biometrics for Network Security
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors: Paul Reid

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net