Ever since the September 11 terrorist attacks, there has been a higher level of concern regarding safety and security measures and a need to improve them at U.S. borders, airports, and public areas. For this reason, both the government and private corporations are turning their attention to the field of biometrics.

The science of biometrics involves analyzing biological, physiological, and/or behavioral characteristics that are unique to a single individual and using them to recognize or verify the identity of that human being. Today, biometric technologies are typically used to analyze human characteristics for security purposes.

There are several different types of biometric technologies, i.e., iris (eye) scanning, retinal recognition, facial recognition, fingerprint recognition, hand geometry, voice recognition, infrared imaging, keyboard dynamics, and handwriting dynamics. A few new, innovative approaches are also being examined to determine their potential for use in biometric analysis, such as ear shape, Deoxyribonucleic Acid (DNA), keystroke (typing) rhythm, and body odor.

Some biometric technologies are more reliable than others, but they are all based on characteristics considered to be unique to a single individual. For example, it is common knowledge that no human being has the same fingerprint as another. Therefore, fingerprinting is a reliable technology. On the other hand, systems that utilize voice recognition or keyboard dynamics and patterns are less reliable since both voices and typing styles can be mimicked.

Because of the high costs associated with biometric security measures, they are still in the developmental stages. However, these types of security systems are currently in limited use at airports, banks, and other institutions. Now that security has become a much higher priority worldwide, corporations and governments alike will have no choice but to take the necessary steps to protect themselves, their customers, and/or their citizens.


Want to download this topic in its entirety? Click here to download a PDF version.

You must have Adobe® Reader® to view PDF files.

Get Adobe Reader

back to Hot Topics | next page


Contact Us | Home | Legal | Site Map
© 2004–2015 Security & Risk Management Group, LLC