Sign In
Not register? Register Now!
Essay Available:
You are here: HomeEssayIT & Computer Science
1 page/≈275 words
1 Source
IT & Computer Science
English (U.S.)
MS Word
Total cost:
$ 5.4

Biomerics: Which One Is More Worrisome For Security Managers? (Essay Sample)


About Biomerics


Student’s Name
Name of Institution
Biometric system is a process or technique which is used for identification and authentication of humans through finger prints, face palms or voice patterns stored in databases of computer. It is a very popular and well managed system that still has defects which are discussed here:
Type I Errors
The type 1 error occurs when person with right credentials and the one having access to the system gets rejected by the biometric software (Brain Waves). It mainly happens because of high level of accuracy set by the programmers. Its rate increases with the rate of the number of transactions over the time. It is commonly known as false rejection rate and FRR typically is stated as the ratio of the number of false recognitions divided by the number of identification attempts made by the user.
Type 2 Errors
It is when a person with wrong credentials gets cleared by the system. It mainly happens because of less rate of accuracy set by programmers in cases when the companies try to deliver a user friendly system and is tied to false rejection as well as the technical limitations of systems. It is calculated as the ratio of the number of false acceptances divided by the number of identification attempts made by the user (Margate Rousse).
Which one is more worrisome for Security Managers?
For the security managers working in the company, it is more dangerous for them that their biometric system is making Type 2 biometric errors. Because it gives access to the person who is not allowed to use the system and he can also manip...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Computer Hradware and Software Research Assignment
    Description: This sample provides a response to the question by explicitly explaining various components of a computer hardware and software, how they are coordinated and the process of executing a command....
    4 pages/≈1100 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Digital Crime Theories: Affects Millions People Worldwide
    Description: Digital crime, otherwise known as cyber-crime is an emerging vice that has been affecting millions of people worldwide. ...
    4 pages/≈1100 words| 3 Sources | APA | IT & Computer Science | Essay |
  • Analyze the Challenges of Managing Human Aspect of Cyber Security
    Description: Analyze the challenges of managing human aspect of cyber security, with an emphasis on the employees and insider threats...
    4 pages/≈1100 words| 7 Sources | APA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!