COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
medical security
|
|
biometric security
|
|
biology security
|
|
body security
|
Detailed explanation-1: -Fingerprint recognition and iris scanning are the most well-known forms of biometric security. However, facial recognition and (finger and palm) vein pattern recognition are also gaining in popularity. In this article we consider the pros and cons of all these different techniques for biometric security.
Detailed explanation-2: -Here are some common examples of biometric security: Voice Recognition. Fingerprint Scanning. Facial Recognition.
Detailed explanation-3: -Iris recognition or iris scanning is the process of using visible and near-infrared light to take a high-contrast photograph of a person’s iris. It is a form of biometric technology in the same category as face recognition and fingerprinting.
Detailed explanation-4: -What are examples of biometrics? Popular biometric options are Fingerprint recognition, 2D face recognition, 3D face recognition, Iris recognition, Hand geometry, Hand and finger vein recognition and of course your DNA.
Detailed explanation-5: -Biometrics are unique physical characteristics, such as fingerprints, that can be used for automated recognition.