Posted by: Robert Davis
Access Controls, Authentication, Biometrics, Crackers, Hackers, IAP, Identification, Information Assets Protection, Information Security, Information Security Infrastructure Management, ISIM
Technology attacks and attendant security compromises are never easily managed. Parallel to the ingenuity of attackers and proportional to the value placed on entrusted information assets, effective security access controls are imperative. Given the current accuracy of automated user identification and authentication processes, no single security system should ever be promoted as infallible. However, there is sufficient merit in most available biometric systems to warrant deployment consideration for information assets protection. Coupled with other access restriction techniques, biometric technology systems can be a formidable deterrent to unauthorized activities that may disable an entity’s information security infrastructure.
“View Part I of the Biometric Technology series here“