Conclusion

 <  Day Day Up  >  

It is clear from examining the biometric transaction that privacy can be truly guaranteed only when adequate security measures are taken. The security measures must be in place from the time when the user is ready to authenticate to the moment when the matching decision is made.

The threats to a biometric transaction are numerous and always present. Therefore, continuous vigilance is necessary to keep the authentication and local hosts patched, and ensure that only the proper people are accessing the local host and authentication server, Even with the best security methods in place, there will still be some level of uncertainty in the transaction. That feeling of uncertainty will be directly proportional to the risk of the methods used during biometric transactions. Hopefully, an increase of time, money, and effort will sufficiently reduce the number of people able to attack a biometric system.

 <  Day Day Up  >  


Biometrics for Network Security
Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
ISBN: 0131015494
EAN: 2147483647
Year: 2003
Pages: 123
Authors: Paul Reid

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net