Sign In
Not register? Register Now!
Essay Available:
Pages:
8 pages/≈2200 words
Sources:
4 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Research Proposal
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 52.2
Topic:

Technology IT & Computer Science Research Proposal (Research Proposal Sample)

Instructions:

The task involved the evaluation of biometric systems and their various applications in the technology world. the attached document is a sample of the document that resulted from my writing on the topic

source..
Content:


Biometrics
Name
Institution
Biometrics
The How of Biometrics
In the 21st century, one of the things that has made strides to keep up with the rapidly evolving technology is security and privacy. People have embraced modern technology with a large percentile of people having access to the internet. Even so, many people have no education on all the breeches of privacy that could arise from the use of this technology. Regardless of a large population of people not knowing about privacy issues, tech companies have continuously made efforts to improve security and user-data privacy (De Luca, et al., 2015). As such, there has been a thread of ways that people could protect their data. Some of the early methods used included using a pattern of keys to lock the screen. This was mainly to keep off children from interfering with the phone (De Luca, et al., 2015). However, as technology has evolved, these gadgets have become a spare to who we are like a lock has two keys.
Security tools evolved from pressing the menu key followed by the (*) key to using of patterns and passwords in the era of smartphones. Today, biometric security systems are on the rise after especially in smartphone security (De Luca, et al., 2015). Biometrics simply covers all measurements and calculations that determine an individual’s unique physical and behavioral traits. This technology has been used in identification of individuals and to manage access. Other than access control and identification, security forces and research teams use biometrics to denote individuals who are under their surveillance.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Research and Describe TCP-IP Security and Cover Channels
    Description: The communication entity is organized into four necessary layers classified by the related functionality in a connection case. ...
    3 pages/≈825 words| 4 Sources | APA | IT & Computer Science | Research Proposal |
  • Research Paper On Designing A Data Network For Acme, Inc.
    Description: A computer network describes a digital telecommunication network that allows various nodes to share resources (Gupta, 2006)...
    6 pages/≈1650 words| 3 Sources | APA | IT & Computer Science | Research Proposal |
  • Computer Science Research on Windows Network
    Description: How will the shares be secured? Will quotas be used? FSRM be configured? What technology will be implemented to provide secure remote access for users?...
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Research Proposal |
Need a Custom Essay Written?
First time 15% Discount!