1. Home
  2. Training Library
  3. Introducing Operating Systems | ITL3 A2.1 |

What are Biometrics?

Developed with
QA

Contents

keyboard_tab
Discover & Practice Online: Introducing Operating Systems
play-arrow
Start course
Overview
Difficulty
Beginner
Duration
24m
Students
359
Ratings
4.4/5
starstarstarstarstar-half
Description
Task instructions
  1. Watch ‘How do operating systems work?’ and take notes in the Notes section on page 10 of your progress report. These notes will help you as you fill out your Progress Report.

  2. Watch ‘What different components make up a PC?’ and complete pages 3 and 4 of your Progress report.

  3. Watch ‘Precaution when making a PC’ and compete page 6 of your Progress Report.

  4. Watch ‘What is VoIP?’ and complete page 7 of your Progress Report.

  5. Watch ‘Why do you need a VPN’ and ‘What are Biometrics?’ and complete page 8 of your Progress Report.
It is always important to consider multiple solutions when you're approaching a task. Whilst watching these videos, you’ve designed and suggested an operating system to your client, but they aren't quite happy with it. They would like you to suggest an alternative.
  1. Research alternative operating systems to the one that you originally suggested. Think about:
    • How it's different to the one you previously suggested
    • How it fits the brief

  2. Complete page 9 of your Progress Report.
Transcript

- Your train was late, but somehow you make it to the head office just in time for that all important nine o'clock meeting and you realize you've forgotten the passcode to actually get into the building. The meeting is starting, no one is answering their phone and you're stuck outside, we've all been there. Remembering passwords can be a pain, especially when we're encouraged to have different passwords for every system we log into. So, is there another way of gaining access to something such as a company's headquarters without one? You can gain access to systems, devices or data using biometrics. Biometrics are physical or human characteristics that you can use to identify a person such as fingerprint mapping, facial or voice recognition and retina scans. You can use these characteristics on their own or as a combination to ensure more accurate identification. The key is that the characteristic must be unique to the individual. Because the information needed is literally a part of you, biometrics makes authentication faster and more secure than traditional passwords or PINs. However, if you're using a biometric authentication system, you need to be careful to avoid violating employee or customer privacy. You also need to watch out for exposing sensitive information. If someone guesses your password, you can change it. If someone steals your biometric information, you can't get new fingerprints. This means that it's extremely important that you keep biometric data secure. A security breach could create permanent risks for the user, as well as having huge legal implications for the organization that loses the data. You are responsible for your own security decisions. So it's important that you reduce the risk and consequences of a security breach by choosing the right system vendor. It's vital that you know who is responsible for any information leaks, particularly if you work for a smaller organization. To protect yourself legally, you shouldn't store any data linked to biometrics. You should encrypt the data so that it never goes near the organization's servers. Take our HQ scenario for example. If you use your fingerprint to access the building, your personal information is encrypted at the scanner and goes straight to a processor which recognizes that you are allowed to access and opens the doors. Your information is never given to the organization. Encryption reduces potential security risks for the individual and compliance implications for the organization. Sometimes you can't avoid storing authentication information on your servers. In this case, you should always follow the best practice security measures. Store the data as a template rather than as an image. Encrypt the data and store the data on a device rather than on a central database so that it's isolated and protected from any larger system breaches. If you take care to implement stronger security measures, using biometrics for identification and authentication can make gaining access faster, easier and safer. You'll never have to worry about being locked out of a meeting ever again.

About the Author
Avatar