Wilfredor, CC BY-SA 3.0 (https://creativecommons.org/licenses/by-sa/3.0), via Wikimedia CommonsWilfredor, CC BY-SA 3.0 (https://creativecommons.org/licenses/by-sa/3.0), via Wikimedia Commons

Biometrics refers to the measurement of unique human characteristics such as fingerprints and retinas. The most commonly occurring example is a fingerprint scanner used to scan fingerprints.

Biometric scanners are used in conjunction with software that uses complex algorithms to record and recognize unique human characteristics such as fingerprints. Fingerprint scanners like the one pictured below are commonly used for identification purposes (ID documents & passports).

A fingerprint scanner.
A fingerprint scanner.
Wilfredor, CC BY-SA 3.0 (https://creativecommons.org/licenses/by-sa/3.0), via Wikimedia Commons
Wilfredor, CC BY-SA 3.0

Biometric authentication is used in computer science as a form of identification for access control.

https://en.wikipedia.org/wiki/Biometrics

It is primarily used for anything that requires a specific user to be physically present, for example:

  • Access Control
  • Time & Attendance

A common theory question focuses on the advantages of biometric security over other forms of security, such as a password or PIN.

BiometricPassword/Pin
Cannot be sharedCan be shared
Cannot be written downCan be written down
The user must be presentThe user does not need to be present
Cannot be guessed or hackedCan be guessed and hacked
Cannot be obtained by a keylogger (spyware)Can be obtained by a keylogger (spyware)

By MisterFoxOnline

Mister Fox AKA @MisterFoxOnline is an ICT, IT and CAT Teacher who has just finished training as a Young Engineers instructor. He has a passion for technology and loves to find solutions to problems using the skills he has learned in the course of his IT career.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.