The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Information Security Governance Using Biometrics
Abstract
To establish the identity of an individual is very critical with the advancement of technology in networked society. Thus, there is need for reliable user authentication technique to solve the growing demand for high level of Information Security Governance (ISG) depending on the requirement. Biometrics can be explained as the method to recognize an individual based on physical (face, fingerprint, ear, iris, etc.) or behavioral (voice, signature, gait, etc.) features to identify an individual person. Nowadays, biometric systems are being used for different purposes for information security like commercial, defense, government, and forensic applications as a means of establishing identity and to mitigate the risk which is one of the important objectives of Information Security Governance. In this chapter, an attempt has been made to explain the use and proper selection of biometric trait to help in Information Security Governance.
Related Content
Robert Casal, Raghvendra Singh, Daniel Della Posta, James Quinn.
© 2023.
24 pages.
|
Nikitha Agnew, Manish Gupta, Raj Sharman.
© 2023.
43 pages.
|
Ajeethra Balamurugan, Harshitha Anand Shetty, Karthikeyan Muthumani Sengunthar, Manish Gupta.
© 2023.
27 pages.
|
Harshada Dayasagar Samant, Raghvendra Singh.
© 2023.
31 pages.
|
Raghvendra Singh.
© 2023.
21 pages.
|
Prabhat Kumar, Othniel Lambert, Sivajit Sreekumar, Mukesh Ravi Bhatia, Akash Garg.
© 2023.
34 pages.
|
Sushmita Podugu, Vamsi Krishna Rayapureddi, Manish Gupta.
© 2023.
30 pages.
|
|
|