How can biometric technology be used to fight cybercrime and cyber rel.docx

T

How can biometric technology be used to fight cybercrime and cyber related crimes? What controversies does the use of this technology raise? Solution Biometric technology is a measurement of unique behavioural and physical characteristics of a human required for personal identification since each individual has a unique identitiy. Features like DNA, face detection, finderprints, voice recognition, palm prints etc. This technology is used largely in figting and preventing crimes. Biometric technology in Cyber crime works as below: 1. Record - Record basic data of the user, then capture image of voice of the user using a sensor or scanner. 2.Store- Store the image or voice recorded as a graph using a computer 3.Compare - Compare the stored information with recorded information and either accept or reject the authenticated information.This requires a specific software to analyse the characteristics of a code and compare. Controversies:Use of biometric technology is not without controversies. 1. Many people fear that the Government of Cyber Crime Cell may use biometrics to track people during everyday transactions. 2.There is chance of personal identification information being misplaced. 3. There is fear in hackers using biometrics to hack one\'s personal data. .

How can biometric technology be used to fight cybercrime and cyber related crimes? What
controversies does the use of this technology raise?
Solution
Biometric technology is a measurement of unique behavioural and physical characteristics of a
human required for personal identification since each individual has a unique identitiy. Features
like DNA, face detection, finderprints, voice recognition, palm prints etc. This technology is
used largely in figting and preventing crimes.
Biometric technology in Cyber crime works as below:
1. Record - Record basic data of the user, then capture image of voice of the user using a sensor
or scanner.
2.Store- Store the image or voice recorded as a graph using a computer
3.Compare - Compare the stored information with recorded information and either accept or
reject the authenticated information.This requires a specific software to analyse the
characteristics of a code and compare.
Controversies:Use of biometric technology is not without controversies.
1. Many people fear that the Government of Cyber Crime Cell may use biometrics to track
people during everyday transactions.
2.There is chance of personal identification information being misplaced.
3. There is fear in hackers using biometrics to hack one's personal data.
How can biometric technology be used to fight cybercrime and cyber rel.docx

Recomendados

Biometrics por
BiometricsBiometrics
BiometricsPriyanka Sharma
10.6K visualizações36 slides
Seetu por
SeetuSeetu
Seetuseetumishra2511
270 visualizações25 slides
Biometric security using cryptography por
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
15.5K visualizações31 slides
Biometrics Research/Thesis Paper por
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis PaperSumaiya Ismail
116 visualizações5 slides
Bio-metric Safety engineering in mobile devices por
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
256 visualizações20 slides
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern por
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
7 visualizações5 slides

Mais conteúdo relacionado

Similar a How can biometric technology be used to fight cybercrime and cyber rel.docx

Biometric Technology por
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
2.9K visualizações15 slides
Biometric authentication por
Biometric authenticationBiometric authentication
Biometric authenticationAbduhalim Beknazarov
1.7K visualizações12 slides
Biometrics por
BiometricsBiometrics
Biometricsbiometrics12
114 visualizações2 slides
Antispoofing in face biometrics: A comprehensive study on software-based tech... por
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...CSITiaesprime
13 visualizações13 slides
Biometrics security por
Biometrics securityBiometrics security
Biometrics securityVuda Sreenivasarao
4K visualizações57 slides
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System por
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
1.4K visualizações5 slides

Similar a How can biometric technology be used to fight cybercrime and cyber rel.docx(20)

Biometric Technology por Adoitya Kaila
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila2.9K visualizações
Biometric authentication por Abduhalim Beknazarov
Biometric authenticationBiometric authentication
Biometric authentication
Abduhalim Beknazarov1.7K visualizações
Biometrics por biometrics12
BiometricsBiometrics
Biometrics
biometrics12114 visualizações
Antispoofing in face biometrics: A comprehensive study on software-based tech... por CSITiaesprime
Antispoofing in face biometrics: A comprehensive study on software-based tech...Antispoofing in face biometrics: A comprehensive study on software-based tech...
Antispoofing in face biometrics: A comprehensive study on software-based tech...
CSITiaesprime13 visualizações
Biometrics security por Vuda Sreenivasarao
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao4K visualizações
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System por IJMER
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
IJMER1.4K visualizações
Security Issues Related to Biometrics por YogeshIJTSRD
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD67 visualizações
Disadvantages Of Hand Based Biometrics por Alexis Naranjo
Disadvantages Of Hand Based BiometricsDisadvantages Of Hand Based Biometrics
Disadvantages Of Hand Based Biometrics
Alexis Naranjo3 visualizações
Ins & Outs of Biometric Authentication por IVR Technology Group
Ins & Outs of Biometric AuthenticationIns & Outs of Biometric Authentication
Ins & Outs of Biometric Authentication
IVR Technology Group1.1K visualizações
4.report (biometric security system) por JIEMS Akkalkuwa
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa92 visualizações
Biometrics/fingerprint sensors por Jeffrey Funk
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk13.8K visualizações
Biometrics por Satish Chandra
BiometricsBiometrics
Biometrics
Satish Chandra1.1K visualizações
Bio metrics in secure e transaction por IJARIIT
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
IJARIIT87 visualizações
Biometric System and Recognition Authentication and Security Issues por ijtsrd
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
ijtsrd93 visualizações
Biometrics por shweta-sharma99
BiometricsBiometrics
Biometrics
shweta-sharma99937 visualizações
Biometrics por shweta-sharma99
BiometricsBiometrics
Biometrics
shweta-sharma992.2K visualizações
Biometrics por Shivani Gautam
BiometricsBiometrics
Biometrics
Shivani Gautam1.3K visualizações
Attacks on Mobile Devices by Nitish.pptx por NitishChoudhary23
Attacks on Mobile Devices by Nitish.pptxAttacks on Mobile Devices by Nitish.pptx
Attacks on Mobile Devices by Nitish.pptx
NitishChoudhary237 visualizações
Advantages Of Biometrics por Avis Malave
Advantages Of BiometricsAdvantages Of Biometrics
Advantages Of Biometrics
Avis Malave2 visualizações

Mais de tpaula2

How can I calculate the missing amounts for each of the independent ca.docx por
How can I calculate the missing amounts for each of the independent ca.docxHow can I calculate the missing amounts for each of the independent ca.docx
How can I calculate the missing amounts for each of the independent ca.docxtpaula2
8 visualizações2 slides
How do COQ and capability relate-SolutionBorn 130 years ago- Le coq sp.docx por
How do COQ and capability relate-SolutionBorn 130 years ago- Le coq sp.docxHow do COQ and capability relate-SolutionBorn 130 years ago- Le coq sp.docx
How do COQ and capability relate-SolutionBorn 130 years ago- Le coq sp.docxtpaula2
2 visualizações2 slides
How do --per capita-- considerations affect a company-'s decision to e.docx por
How do --per capita-- considerations affect a company-'s decision to e.docxHow do --per capita-- considerations affect a company-'s decision to e.docx
How do --per capita-- considerations affect a company-'s decision to e.docxtpaula2
2 visualizações1 slide
How do I calculate the limiting reagent and percent yield for creating.docx por
How do I calculate the limiting reagent and percent yield for creating.docxHow do I calculate the limiting reagent and percent yield for creating.docx
How do I calculate the limiting reagent and percent yield for creating.docxtpaula2
8 visualizações2 slides
How can you classify the molecular structures of the polymers- Explain.docx por
How can you classify the molecular structures of the polymers- Explain.docxHow can you classify the molecular structures of the polymers- Explain.docx
How can you classify the molecular structures of the polymers- Explain.docxtpaula2
4 visualizações2 slides
How could I show that the nitrate test confirmed that two unknown solu.docx por
How could I show that the nitrate test confirmed that two unknown solu.docxHow could I show that the nitrate test confirmed that two unknown solu.docx
How could I show that the nitrate test confirmed that two unknown solu.docxtpaula2
7 visualizações2 slides

Mais de tpaula2(20)

How can I calculate the missing amounts for each of the independent ca.docx por tpaula2
How can I calculate the missing amounts for each of the independent ca.docxHow can I calculate the missing amounts for each of the independent ca.docx
How can I calculate the missing amounts for each of the independent ca.docx
tpaula28 visualizações
How do COQ and capability relate-SolutionBorn 130 years ago- Le coq sp.docx por tpaula2
How do COQ and capability relate-SolutionBorn 130 years ago- Le coq sp.docxHow do COQ and capability relate-SolutionBorn 130 years ago- Le coq sp.docx
How do COQ and capability relate-SolutionBorn 130 years ago- Le coq sp.docx
tpaula22 visualizações
How do --per capita-- considerations affect a company-'s decision to e.docx por tpaula2
How do --per capita-- considerations affect a company-'s decision to e.docxHow do --per capita-- considerations affect a company-'s decision to e.docx
How do --per capita-- considerations affect a company-'s decision to e.docx
tpaula22 visualizações
How do I calculate the limiting reagent and percent yield for creating.docx por tpaula2
How do I calculate the limiting reagent and percent yield for creating.docxHow do I calculate the limiting reagent and percent yield for creating.docx
How do I calculate the limiting reagent and percent yield for creating.docx
tpaula28 visualizações
How can you classify the molecular structures of the polymers- Explain.docx por tpaula2
How can you classify the molecular structures of the polymers- Explain.docxHow can you classify the molecular structures of the polymers- Explain.docx
How can you classify the molecular structures of the polymers- Explain.docx
tpaula24 visualizações
How could I show that the nitrate test confirmed that two unknown solu.docx por tpaula2
How could I show that the nitrate test confirmed that two unknown solu.docxHow could I show that the nitrate test confirmed that two unknown solu.docx
How could I show that the nitrate test confirmed that two unknown solu.docx
tpaula27 visualizações
how can you determine if a computer is using pipelining-SolutionIn old.docx por tpaula2
how can you determine if a computer is using pipelining-SolutionIn old.docxhow can you determine if a computer is using pipelining-SolutionIn old.docx
how can you determine if a computer is using pipelining-SolutionIn old.docx
tpaula22 visualizações
How do changes in activity affect contribution margin and net operatin.docx por tpaula2
How do changes in activity affect contribution margin and net operatin.docxHow do changes in activity affect contribution margin and net operatin.docx
How do changes in activity affect contribution margin and net operatin.docx
tpaula23 visualizações
How do convert strings inside a vector to integers and then find the a.docx por tpaula2
How do convert strings inside a vector to integers and then find the a.docxHow do convert strings inside a vector to integers and then find the a.docx
How do convert strings inside a vector to integers and then find the a.docx
tpaula22 visualizações
How do arrays compare with variables and how do they differ- Give a si.docx por tpaula2
How do arrays compare with variables and how do they differ- Give a si.docxHow do arrays compare with variables and how do they differ- Give a si.docx
How do arrays compare with variables and how do they differ- Give a si.docx
tpaula23 visualizações
How can the use of Internet search engines to locate information about.docx por tpaula2
How can the use of Internet search engines to locate information about.docxHow can the use of Internet search engines to locate information about.docx
How can the use of Internet search engines to locate information about.docx
tpaula23 visualizações
How can the forms of business organizations impact the control of the.docx por tpaula2
How can the forms of business organizations impact the control of the.docxHow can the forms of business organizations impact the control of the.docx
How can the forms of business organizations impact the control of the.docx
tpaula24 visualizações
how can i store 30 prices on this void get prices and save it to the a.docx por tpaula2
how can i store 30 prices on this void get prices and save it to the a.docxhow can i store 30 prices on this void get prices and save it to the a.docx
how can i store 30 prices on this void get prices and save it to the a.docx
tpaula22 visualizações
How can a company assess person-job fit before hiring employees What a.docx por tpaula2
How can a company assess person-job fit before hiring employees What a.docxHow can a company assess person-job fit before hiring employees What a.docx
How can a company assess person-job fit before hiring employees What a.docx
tpaula23 visualizações
How can CORS be used to exploit the following password reset page- The.docx por tpaula2
How can CORS be used to exploit the following password reset page- The.docxHow can CORS be used to exploit the following password reset page- The.docx
How can CORS be used to exploit the following password reset page- The.docx
tpaula23 visualizações
How are encryption- authentication- digital signatures- and digital ce.docx por tpaula2
How are encryption- authentication- digital signatures- and digital ce.docxHow are encryption- authentication- digital signatures- and digital ce.docx
How are encryption- authentication- digital signatures- and digital ce.docx
tpaula24 visualizações
How are cash equivalents treated on a statement of cash flows- They ar.docx por tpaula2
How are cash equivalents treated on a statement of cash flows- They ar.docxHow are cash equivalents treated on a statement of cash flows- They ar.docx
How are cash equivalents treated on a statement of cash flows- They ar.docx
tpaula22 visualizações
home - study - science - physics - physics questions and answers - an.docx por tpaula2
home - study - science - physics - physics questions and answers - an.docxhome - study - science - physics - physics questions and answers - an.docx
home - study - science - physics - physics questions and answers - an.docx
tpaula22 visualizações
HOME -NSERI PAGE LAYOUT FORMULAS DATA REVEW VIPw Cut Copy Farnat Paint.docx por tpaula2
HOME -NSERI PAGE LAYOUT FORMULAS DATA REVEW VIPw Cut Copy Farnat Paint.docxHOME -NSERI PAGE LAYOUT FORMULAS DATA REVEW VIPw Cut Copy Farnat Paint.docx
HOME -NSERI PAGE LAYOUT FORMULAS DATA REVEW VIPw Cut Copy Farnat Paint.docx
tpaula22 visualizações
Horizontal Analysis The comparative accounts payable and long-term deb.docx por tpaula2
Horizontal Analysis The comparative accounts payable and long-term deb.docxHorizontal Analysis The comparative accounts payable and long-term deb.docx
Horizontal Analysis The comparative accounts payable and long-term deb.docx
tpaula22 visualizações

Último

Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx por
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxPharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxMs. Pooja Bhandare
93 visualizações51 slides
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxISSIP
379 visualizações50 slides
CONTENTS.pptx por
CONTENTS.pptxCONTENTS.pptx
CONTENTS.pptxiguerendiain
57 visualizações17 slides
11.30.23 Poverty and Inequality in America.pptx por
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptxmary850239
167 visualizações33 slides
AUDIENCE - BANDURA.pptx por
AUDIENCE - BANDURA.pptxAUDIENCE - BANDURA.pptx
AUDIENCE - BANDURA.pptxiammrhaywood
89 visualizações44 slides
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Ms. Pooja Bhandare
109 visualizações45 slides

Último(20)

Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx por Ms. Pooja Bhandare
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptxPharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Pharmaceutical Inorganic chemistry UNIT-V Radiopharmaceutical.pptx
Ms. Pooja Bhandare93 visualizações
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx por ISSIP
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptxEIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
EIT-Digital_Spohrer_AI_Intro 20231128 v1.pptx
ISSIP379 visualizações
CONTENTS.pptx por iguerendiain
CONTENTS.pptxCONTENTS.pptx
CONTENTS.pptx
iguerendiain57 visualizações
11.30.23 Poverty and Inequality in America.pptx por mary850239
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptx
mary850239167 visualizações
AUDIENCE - BANDURA.pptx por iammrhaywood
AUDIENCE - BANDURA.pptxAUDIENCE - BANDURA.pptx
AUDIENCE - BANDURA.pptx
iammrhaywood89 visualizações
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant... por Ms. Pooja Bhandare
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Pharmaceutical Inorganic Chemistry Unit IVMiscellaneous compounds Expectorant...
Ms. Pooja Bhandare109 visualizações
Ch. 7 Political Participation and Elections.pptx por Rommel Regala
Ch. 7 Political Participation and Elections.pptxCh. 7 Political Participation and Elections.pptx
Ch. 7 Political Participation and Elections.pptx
Rommel Regala105 visualizações
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx por Debapriya Chakraborty
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Debapriya Chakraborty684 visualizações
ACTIVITY BOOK key water sports.pptx por Mar Caston Palacio
ACTIVITY BOOK key water sports.pptxACTIVITY BOOK key water sports.pptx
ACTIVITY BOOK key water sports.pptx
Mar Caston Palacio745 visualizações
CUNY IT Picciano.pptx por apicciano
CUNY IT Picciano.pptxCUNY IT Picciano.pptx
CUNY IT Picciano.pptx
apicciano54 visualizações
How to empty an One2many field in Odoo por Celine George
How to empty an One2many field in OdooHow to empty an One2many field in Odoo
How to empty an One2many field in Odoo
Celine George72 visualizações
The basics - information, data, technology and systems.pdf por JonathanCovena1
The basics - information, data, technology and systems.pdfThe basics - information, data, technology and systems.pdf
The basics - information, data, technology and systems.pdf
JonathanCovena1126 visualizações
Google solution challenge..pptx por ChitreshGyanani1
Google solution challenge..pptxGoogle solution challenge..pptx
Google solution challenge..pptx
ChitreshGyanani1135 visualizações
Ch. 8 Political Party and Party System.pptx por Rommel Regala
Ch. 8 Political Party and Party System.pptxCh. 8 Political Party and Party System.pptx
Ch. 8 Political Party and Party System.pptx
Rommel Regala53 visualizações
MIXING OF PHARMACEUTICALS.pptx por Anupkumar Sharma
MIXING OF PHARMACEUTICALS.pptxMIXING OF PHARMACEUTICALS.pptx
MIXING OF PHARMACEUTICALS.pptx
Anupkumar Sharma82 visualizações
UNIDAD 3 6º C.MEDIO.pptx por MarcosRodriguezUcedo
UNIDAD 3 6º C.MEDIO.pptxUNIDAD 3 6º C.MEDIO.pptx
UNIDAD 3 6º C.MEDIO.pptx
MarcosRodriguezUcedo124 visualizações
Drama KS5 Breakdown por WestHatch
Drama KS5 BreakdownDrama KS5 Breakdown
Drama KS5 Breakdown
WestHatch87 visualizações

How can biometric technology be used to fight cybercrime and cyber rel.docx

  • 1. How can biometric technology be used to fight cybercrime and cyber related crimes? What controversies does the use of this technology raise? Solution Biometric technology is a measurement of unique behavioural and physical characteristics of a human required for personal identification since each individual has a unique identitiy. Features like DNA, face detection, finderprints, voice recognition, palm prints etc. This technology is used largely in figting and preventing crimes. Biometric technology in Cyber crime works as below: 1. Record - Record basic data of the user, then capture image of voice of the user using a sensor or scanner. 2.Store- Store the image or voice recorded as a graph using a computer 3.Compare - Compare the stored information with recorded information and either accept or reject the authenticated information.This requires a specific software to analyse the characteristics of a code and compare. Controversies:Use of biometric technology is not without controversies. 1. Many people fear that the Government of Cyber Crime Cell may use biometrics to track people during everyday transactions. 2.There is chance of personal identification information being misplaced. 3. There is fear in hackers using biometrics to hack one's personal data.