The Choice of a Biometric for Network Access

 <  Day Day Up  >  

As seen in this chapter, each biometric was evaluated for its suitability for network security and scores were given for each characteristic. Figure 9-5 contains a graph showing all the individual graphs together. Here, it is very easy to see how a particular biometric performed relative to the other biometrics.

Figure 9-5. Scores for all biometrics.

graphics/09fig05.gif

It is clear from Figure 9-5 that the closest overall to being ideal is the fingerprint biometric. This is also what is being seen in the marketplace . Fingerprint biometrics are clearly deployed more than any other type of biometric solution. The reasons for this are their overall general suitability for use and their robustness.

 <  Day Day Up  >  


Biometrics for Network Security
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors: Paul Reid

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net