Thursday, 28 August 2014

Biometric Security Part 3/3

Facial recognition

Disadvantages
a. 2D recognition is affected by changes in lighting, the person’s hair, the age, and if the person wear glasses.
b. Requires camera equipment for user identification; thus, it is not likely to become popular until most PCs include cameras as standard equipment.

Voice recognition:

Disadvantages:
a. A person’s voice can be easily recorded and used for unauthorised PC or network.
b. Low accuracy.
c. An illness such as a cold can change a person’s voice, making absolute identification difficult or impossible.

Retinal scanning:

Disadvantages:
a. Very intrusive.
b. It has the stigma of consumer's thinking it is potentially harmful to the eye.
c. Comparisons of template records can take upwards of 10 seconds, depending on the size of the database.
d. Very expensive.

Iris recognition:

Disadvantages:
a. Intrusive.
b. A lot of memory for the data to be stored.
c. Very expensive

Fingerprint:

Disadvantages:
a. For some people it is very intrusive, because is still related to criminal identification.
b. It can make mistakes with the dryness or dirty of the finger’s skin, as well as with the age (is not appropriate with children, because the size of their fingerprint changes quickly).
c. Image captured at 500 dots per inch (dpi). Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 Kbytes approximately → Compression required (a factor of 10 approximately).


Biometric Security Part 2/3

Facial recognition

Advantages:
a. Non intrusive
b. Cheap technology.

Voice recognition:

Advantages:
a. Non intrusive. High social acceptability.
b. Verification time is about five seconds.
c. Cheap technology.

Retinal scanning:

Advantages:
a. Very high accuracy.
b. There is no known way to replicate a retina.
c. The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being.

Iris recognition:

Advantages:
a. Very high accuracy.
b. Verification time is generally less than 5 seconds.
c. The eye from a dead person would deteriorate too fast to be useful, so no extra precautions have to been taken with retinal scans to be sure the user is a living human being.

Fingerprint:

Advantages:
a. Very high accuracy.
b. Is the most economical biometric PC user authentication technique.
c. it is one of the most developed biometrics
d. Easy to use.
e. Small storage space required for the biometric template, reducing the size of the database memory required
f. It is standardized.


Supply Chain Management Part 3/3

Supply chain management (SCM) is the process by which manufacturers make sure their product is created and supplied to its customers effectively. There are five steps to this process: plan, develop, make, deliver, and return. The key factor of this process is to be completely efficient. There are a few small disadvantages to this process, ones that are usually seen early on in the setup process. These disadvantages are the investment of time, resources, and money to overlook the supply chain.



Supply Chain Management Part 2/3


Advantages of Supply Chain Management



Reduced Costs
Supply chain management involves identifying those processes that increase cost without increasing the value of the final product. These processes are wasteful and do not add value, and should be eliminated whenever possible.

Increased Efficiency
Resource wastage is a common source of increase production costs. Often this is due to improper planning. A company that employs supply chain management is able to achieve efficiency of its operations since only those value adding activities are encouraged. This ensures that the organization’s processes flow smoothly and output keeps inline with the company's needs.

Increased OutputA company that employs supply chain management can foster close-knit relationships with its suppliers and customers, ensuring the timely fulfillment of orders. A company known for its timeliness and responsiveness will attract more customers, and will grow as a result of increased output and sales.

Increased Profits
Businesses exist to make profits. One of the most efficient ways of increasing a company’s profits is by ensuring that costs are kept as low as possible. The application of supply chain management by a small company leads to cost reductions due to elimination of wasteful processes. Since these are operating costs for the company, the savings on these costs reflect increased profits by the company.


Wi-Fi Part 3/3

Disadvantages of Wifi

Security
To combat this consideration, wireless networks may choose to utilize some of the various encryption technologies available. Some of the more commonly utilized encryption methods, however, are known to have weaknesses that a dedicated adversary can compromise.

Range
The typical range of a common 802.11g network with standard equipment is on the order of tens of meters. While sufficient for a typical home, it will be insufficient in a larger structure. To obtain additional range, repeaters or additional access points will have to be purchased. Costs for these items can add up quickly.

Reliability
Like any radio frequency transmission, wireless networking signals are subject to a wide variety of interference, as well as complex propagation effects that are beyond the control of the network administrator.

Speed
The speed on most wireless networks (typically 1-54 Mbps) is far slower than even the slowest common wired networks (100Mbps up to several Gbps). However, in specialized environments, the throughput of a wired network might be necessary.



Wednesday, 27 August 2014

Wi-Fi Part 2/3



Advantages of Wifi

Convenience
The wireless nature of such networks allows users to access network resources from nearly any convenient location within their primary networking environment
(a home or office). With the increasing saturation of laptop-style computers, this is particularly relevant.

Mobility
With the emergence of public wireless networks, users can access the internet even outside their normal work environment. Most chain coffee shops, for example, offer their customers a wireless connection to the internet at little or no cost.

Productivity
Users connected to a wireless network can maintain a nearly constant affiliation with their desired network as they move from place to place. For a business, this implies that an employee can potentially be more productive as his or her work can be accomplished from any convenient location.

Deployment
Initial setup of an infrastructure-based wireless network requires little more than a single access point. Wired networks, on the other hand, have the additional cost and complexity of actual physical cables being run to numerous locations (which can even be impossible for hard-to-reach locations within a building).

Expandability
Wireless networks can serve a suddenly-increased number of clients with the existing equipment. In a wired network, additional clients would require additional wiring.

Cost
Wireless networking hardware is at worst a modest increase from wired counterparts. This potentially increased cost is almost always more than outweighed by the savings in cost and labor associated to running physical cables.

Tuesday, 26 August 2014

Biometric Security Part 1/3


Security biometric is the science of using physical characteristics (fingerprints, eyes, hands) to identify a person and some of the products used in this system include fingerprint readers and retinal scanners. When you are considering security biometric , you want to have physical characteristics that are constant and do not change over time and are also difficult to fake or change on purpose.

There are a variety of ethical concerns that have been raised over the use of security biometric and some of which are:

  • Some biometric methods, such as retina scans, are intrusive
  • Gathering of some biometric information, like fingerprints, is usually associated with criminal behaviour
  • You may feel a loss of privacy or personal dignity especially when the information is gathered by large institutions such as the military or police 
  • You may feel embarrassed if you are rejected by a public sensor
  • Automated facial recognition that is used in public places could be used to track your movements without your knowledge or consent 
There are also many questions that have been raised concerning security biometric and two of the top ones are:
  • How will your data be stored and safeguarded?
  • Who will have access to your information?
And then there is that constant question as to which method of security biometric works best. No one method can be said to do the best job of data gathering and each one has some very good points to recommend them with some being less invasive, some being very hard to fake and some can be accomplished without your knowledge of it. So following are some of the biometric identification methods that you can use and it really comes down to what works best for your needs.

Face Recognition biometrics security – This is one of the most flexible methods as it can be done without the person being aware that they are being scanned. This system analyzes specific features that everyone’s face has like the distance between the eyes, width of the nose, position of cheekbones, jaw line and chin to only name a few.


Fingerprint Identification – Your fingerprints remain the same throughout your life and no two fingerprints are alike. This may not work in industrial applications as this requires clean hands and some people may have injury to their prints that prevent proper identification.
Hand Geometry biometrics security – This will work in harsh environments, does not require clean conditions and uses a small dataset. It is not considered as intrusive and is often used in industrial environments.



Retina Scan – There is just no known way to replicate a retina and, as far as is known, the pattern of the blood vessels at the back of the eye is totally unique and never changes. The downside is that it takes about 15 seconds of careful concentration to do a good scan but this still remains a standard one in military and government installations.

Iris Scan – This is also very difficult to duplicate and stays the same for your lifetime although it may be difficult for children or the infirm.
Signature biometrics security – This type of security is easy to gather and is not physically intrusive.


Voice Analysis – This method of security biometric can be accomplished without the person’s knowledge although it is easier to fake by using a tape recording but it cannot be done by trying to imitate another person’s voice.




sources : http://findbiometrics.com/applications/biometrics-security/