FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
____ uses unique biological or physical characteristics to give an authorization rights to an individual
A
Password
B
Biometric
C
encryption
D
None of the above
Explanation: 

Detailed explanation-1: -Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they are who they say they are. Biometric authentication systems compare physical or behavioral traits to stored, confirmed, authentic data in a database.

Detailed explanation-2: -Face, fingerprint, hand geometry, palm print, iris, voice, signature, gait, and keystroke dynamics are examples of biometric traits. In the context of a given system and application, the presentation of a user’s biometric feature involves both biological and behavioral aspects.

Detailed explanation-3: -While there are many types of biometrics for authentication, the five most common types of biometric identifiers are: fingerprints, facial, voice, iris, and palm or finger vein patterns.

Detailed explanation-4: -The two main types of biometric identifiers are either physiological characteristics or behavioral characteristics. Physiological identifiers relate to the composition of the user being authenticated and include the following: facial recognition. fingerprints.

Detailed explanation-5: -Biometric identifiers are often categorized as physiological characteristics which are related to the shape of the body. Examples include, but are not limited to fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina, odor/scent, voice, shape of ears and gait.

There is 1 question to complete.