Internet Security Using Biometrics

Internet Security Using Biometrics

Shrikant Tiwari, Aruni Singh, Ravi Shankar Singh, Sanjay K. Singh
ISBN13: 9781466629196|ISBN10: 1466629193|EISBN13: 9781466629202
DOI: 10.4018/978-1-4666-2919-6.ch074
Cite Chapter Cite Chapter

MLA

Tiwari, Shrikant, et al. "Internet Security Using Biometrics." IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2013, pp. 1680-1707. https://doi.org/10.4018/978-1-4666-2919-6.ch074

APA

Tiwari, S., Singh, A., Singh, R. S., & Singh, S. K. (2013). Internet Security Using Biometrics. In I. Management Association (Ed.), IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 1680-1707). IGI Global. https://doi.org/10.4018/978-1-4666-2919-6.ch074

Chicago

Tiwari, Shrikant, et al. "Internet Security Using Biometrics." In IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1680-1707. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2919-6.ch074

Export Reference

Mendeley
Favorite

Abstract

Internet security is a big challenge for Internet users, and passwords are the primary means of authenticating users. Establishing identity is becoming difficult in this vastly interconnected society. The need for reliable Internet security techniques has increased in the wake of heightened concerns about security and rapid advancements in networking, communication, and mobility. Biometrics is the science of identifying an individual based on his physical (static) or behavioral (dynamic) characteristics, and it is beginning to gain acceptance as a legitimate method for determining an individual’s identity. Biometrics has been used for many years in high security government and military applications, but the technology is now becoming affordable for use as an authentication methods and general security feature. In this chapter, the authors provide an overview of Internet security using Biometrics.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.