Wednesday, August 10, 2011

BIOMETRIC

Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.




ImageCredit/GOOGLEIMAGES

ADVANTAGES



*  Increase security - Provide a convenient and low-cost


   additional tier of security.


* Reduce fraud by employing hard-to-forge technologies and


  materials. For e.g.Minimise the opportunity for ID fraud, buddy


  punching.


* Eliminate problems caused by lost IDs or forgotten passwords by


  using physiological attributes. For e.g. Prevent


  unauthorised use of lost, stolen or "borrowed" ID cards.


*  Reduce password administration costs.


*  Replace hard-to-remember passwords which may be shared or observed.


*  Integrate a wide range of biometric solutions and


   technologies, customer applications and databases into a robust


   and     scalable control solution for facility and network access


*  Make it possible, automatically, to know WHO did WHAT, WHERE


   and WHEN!


*   Offer significant cost savings or increasing ROI in areas such


    as Loss Prevention or Time & Attendance.



*   Unequivocally link an individual to a transaction or event.


 DISADVANTAGES


*  The finger print of those people working in Chemical

 industries are often affected. Therefore these companies should

 not use the finger print mode of authentication.

*   It is found that with age, the voice of a person differs. 

Also when the person has flu or throat infection the voice

 changes or if there there are too much noise in the environment

 this method maynot authenticate correctly. Therefore this method

 of verification is not workable all the time

*   For people affected with diabetes, the eyes get affected

 resulting in differences.

*    Biometrics is an expensive security solution.


ENCRYPTION



Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.

The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from obtaining the contents of transmissions.

ImageCredit/Googleimages

  ADVANTAGES

The advantages are straightforward: you could create a secure way

of communication. Only those people who are meant to receive a

message could understand the message. A third party, even if

they receive the message, could not understand or use the

message. They see the message as useless garbage.

DISADVANTAGES


The disadvantages is the fact that the whole process could hardly

reach a 100% secure communication. There are always some flaw in

the process. And it is time-consuming. It also requires a

technical training for the process and strict discipline for the

people involved in the process.



Thursday, June 23, 2011

Ethics

Definition:

Ethics:
         Ethics is the branch of study dealing with what is the proper course of action for man. It answers the question, "What do I do?" It is the study of right and wrong in human endeavors. At a more fundamental level, it is the method by which we categorize our values and pursue them.

Law:
        Law is the rules established by a governing authority to institute and maintain orderly coexistence.

Computer Technology:
        Computer Technology has brought many changes to the way we live as individual as well as members of societies and organizations. It has had major effects and changes on the economy, health, education, industry, agriculture and many other fields. The ability of computers in gathering, processing, presenting and sending large amount of information has had major changes in the way large organizations as well individuals organize their lives. Computers are at work, in schools and hospitals and many other places. We therefore need to have some basic understanding of how they function and the language associated with them.

The Relation of Law, Ethics and Computer Technology:
        Law and ethics overlap and what is perceived as unethical is also illegal. In other situations, they do not overlap. In some cases, what is perceived as unethical is still legal, and in others, what is illegal is perceived as ethical. A behavior may be perceived as ethical to one person or group but might not be perceived as ethical by another. Further complicating this dichotomy of behavior, laws may have been legislated, effectively stating the government’s position, and presumably the majority opinion, on the behavior. As a result, in today’s diverse business environment, one must consider that law and ethics are not necessarily the same thing. Applying law and ethics to computer technology will result to the proper way of using the computer