ImageCredit/GOOGLEIMAGES
ADVANTAGES
* Increase security - Provide a convenient and low-cost
additional tier of security.
* Reduce fraud by employing hard-to-forge technologies and
materials. For e.g.Minimise the opportunity for ID fraud, buddy
punching.
* Eliminate problems caused by lost IDs or forgotten passwords by
using physiological attributes. For e.g. Prevent
unauthorised use of lost, stolen or "borrowed" ID cards.
* Reduce password administration costs.
* Replace hard-to-remember passwords which may be shared or observed.
* Integrate a wide range of biometric solutions and
technologies, customer applications and databases into a robust
and scalable control solution for facility and network access
* Make it possible, automatically, to know WHO did WHAT, WHERE
and WHEN!
* Offer significant cost savings or increasing ROI in areas such
as Loss Prevention or Time & Attendance.
* Unequivocally link an individual to a transaction or event.
DISADVANTAGES
* The finger print of those people working in Chemical
industries are often affected. Therefore these companies should
not use the finger print mode of authentication.
* It is found that with age, the voice of a person differs.
Also when the person has flu or throat infection the voice
changes or if there there are too much noise in the environment
this method maynot authenticate correctly. Therefore this method
of verification is not workable all the time
* For people affected with diabetes, the eyes get affected
resulting in differences.
* Biometrics is an expensive security solution.
ENCRYPTION
ENCRYPTION
Encryption is the conversion of data into a form, called a ciphertext, that cannot be easily understood by unauthorized people. Decryption is the process of converting encrypted data back into its original form, so it can be understood.
The use of encryption/decryption is as old as the art of communication. In wartime, a cipher, often incorrectly called a code, can be employed to keep the enemy from obtaining the contents of transmissions.
ImageCredit/Googleimages
ADVANTAGES
The advantages are straightforward: you could create a secure way
of communication. Only those people who are meant to receive a
message could understand the message. A third party, even if
they receive the message, could not understand or use the
message. They see the message as useless garbage.
DISADVANTAGES
The disadvantages is the fact that the whole process could hardly
reach a 100% secure communication. There are always some flaw in
the process. And it is time-consuming. It also requires a
technical training for the process and strict discipline for the
people involved in the process.

