1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
10

Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st

andard biometric technique (fingerprint, palm print, iris, facial features, etc.) and research the costs for having biometric readers for that technique located at two separate entrances into a building. Next, research ways in which attackers attempt to defeat this particular standard biometric technique. Finally, how often will this technique reject authorized users while accepting unauthorized users compared to other standard biometric techniques

Computers and Technology
1 answer:
lyudmila [28]3 years ago
7 0

Answer:

Check the explanation

Explanation:

Selecting the bio-metric technique fingerprint, it requires a scanner to read the fingerprint The cost for a scanner is in between 1000 and 5000 Placing two scanners at two entrance of office win cost bellow 10,000 So the cost needed for this technique is medium as compared with other bio-metric techniques

Attacks on this technique can be in saner, channel from scanner to feature extractor, in feature extractor, way in between feature extractor and marcher, in marcher, in database etc this attacks can be protect by using security methods such as cryptography, hashing, watermarking, noses etc

By using watermarking, cryptography and stenography methods, fingerprint has less false detection rate I e it gives high accuracy

I recommend fingerprint technique. Because of it is a standard technique, it has good accuracy and cost is less, and easy to handle, and it is taking small storage space in database.

Kindly check the attached image below.

You might be interested in
Describe one activity that belongs to the organizing phase software engineering.
Lera25 [3.4K]

Answer:

can you be more specific

Explanation:

5 0
3 years ago
Read 2 more answers
Describe the concepts of confidentiality, integrity, and availability (C-I-A), and explain each of the seven domains of a typica
GREYUIT [131]

Answer:

Answer explained below. The remaining part of the question is incomplete

Explanation:

The concepts of confidentiality, integrity, and availability (C-I-A) can be explained in following given points.

1) Confidentiality: Its basically refer to the confidentiality of the information. Here we can think about the protection of the information from unauthorized person. Confidentiality enuser that at what level your information is secured and no unauthorized access will be done to the information. For maintaining the confidentiality, we can use various encryption methods. The main concept of confidentiality is to enforce various techniques like encryption, file permissions and access control to restrict access to important information.

2) Integrity: Integrity of the information refer to the unwanted modification of the information. Integrity of the data as well as the information should be maintained and only the autorized person can access as well as modify the information. For enforcing the integrity, we can implement various hashing techniques on information.

3) Availability: Availability refers to the availability of the information, when ever an autorized person requests for the information. High availability of the information should occur, so that any autorized person can access it, when ever its required. For high availability, we can create backup as well as replicate the data across the geo sites.

Seven domains of a typical IT infrastructure are given below:

1) User Domain: Its refer to the group of users as well as the person who access the information systems.

2) LAN Domain: Refer to the local area network, where various computers are connected to each other.

3) Workstation Domain: The area is called workstation, where various users connect to the IT infrastructure.

4) WAN and LAN link domain: Refer to the connection of local area network to wide area network.

5) WAN domain: Refer to the wide area network, connection of computers in large area.

6) Storage Domain: Refer to the storage, where we store the data.

7) Remote Access Domain: Refer to the domain where mobile user can access the local as well as wide network remotely.

8 0
3 years ago
Proszę daje wszystko potrzebuje tego
Stolb23 [73]
I’m sorry I do not speak that
5 0
3 years ago
Read 2 more answers
What are the disadvantages of having too many featuresin a language?
AlekseyPX

Answer:

Disadvantage of having too many features in a language is that:

  • There are many functions with same name but perform different function or task so it will create an issue or problem.
  • Features do not duplicate one another as, there are different possible syntax for the same meaning.
  • In a mathematical function, sometimes user function and mathematical variable name collide with language base features so it will create problem.
4 0
3 years ago
Why might you add the Outer Glow effect to text?
-Dominant- [34]

Answer:

nothing it's perfect in the way it is

Explanation:

4 0
3 years ago
Other questions:
  • Suppose an array with six rows and eight columns is stored in row major order starting at address 20 (base 10). If each entry in
    8·1 answer
  • Sarah's research shows that business information management professionals also perform the duties of other professionals. Which
    9·1 answer
  • TV show information can either keep track of the number of viewers per show or the name of a show. Information is kept in a file
    6·1 answer
  • Design and implement your own simple class to represent any household item of your choice (toaster, fan, hair dryer, piano ...)
    11·1 answer
  • Which Internet Explorer security zone includes all Internet Web sites that are not specifically assigned to another zone?
    7·1 answer
  • Krya needs help deciding which colors she should use on her web page. What can she use to help her decide.
    11·1 answer
  • Approximately how long did it take, in minutes, for the body to return to normal after the intake of water.
    11·1 answer
  • HELP ME PLZZZ I'll give brainist​
    9·1 answer
  • A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not
    15·1 answer
  • * what is an electronic mail ?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!