You are on page 1of 4

Submitted By Masooma Maryam.

Class: 7d
(Q-No:1 ) Biometric scanner: A biometric device is based on a technology that can identify a
person using their unique facial characteristics, fingerprints, signatures, DNA, or iris pattern. It has
been derived from the Greek terms' bio', which means 'life' and' metric,' which means 'to measure.'
The main uses of biometric systems and devices are following
1. identification and authentication.
2. Biometric devices are most commonly used in security.
3. Banking.
4. mobile access and authentication
5. law enforcement.
6. public transports.
7. schools.
8. home assistants.
9. building access
Biometric system improves security system which is discussed below.

 No Passwords to Steal: Biometrics allow companies to replace passwords and


tokens with an easy-to-use yet secure solution, eliminating the threat passwords pose
and boosting overall access control with proof of identity.

 Proof of Identity: The main advantage that biometric authentication brings to


security is proof of who’s behind the transaction. Whether it’s making a payment or
logging into a server, biometrics require a physical component, who the user actually is,
to grant access. Identity-based access control is a significant improvement over
alternative authentication factors something you know or something you are because
these can be borrowed, sold, or stolen. Only biometrics provides proof of identity,
rather than simply granting access.

 Improved Privacy: While one of the biggest concerns consumers have surrounding
biometrics is privacy, a properly implemented biometric authentication solution actually
enhances personal privacy. When biometric data is encrypted and securely stored using
techniques like visual cryptography and a distributed data model, it drastically reduces
the risk of a user’s biometric data being compromised in a data breach – not to mention
cutting the risk of a data breach itself.
(Q-No:2): Epassword?

A password is a string of characters used to verify the identity of a user during


the authentication process. Passwords are typically used in tandem with a username; they are
designed to be known only to the user and allow that user to gain access to a device,
application or website. Passwords can vary in length and can contain letters, numbers and
special characters.

A password is sometimes called a passphrase, when the password uses more than one word, or
a passcode or passkey, when the password uses only numbers, such as a personal identification
number (PIN).

A password is a simple application of challenge-response authentication, using a verbal, written


or typed code to satisfy the challenge request. The order and variety of characters are often
what determines the difficulty, or security strength, of a given password. That is why security
systems often require users to create passwords that use at least one capital letter, number and
symbol. For a password to be an effective security mechanism, its details must be kept secret.
Otherwise, unauthorized users could gain access to the files and securities one is trying to
protect.

(Q-No:3) port : A port is a virtual point where network connections start and end. Ports are
software-based and managed by a computer's operating system. Each port is associated with a
specific process or service. Ports allow computers to easily differentiate between different kinds
of traffic: emails go to a different port than weLAN port: ( Local Area Network) A LAN port, also
known as a network port or network connection, is a socket used to connect computers,
servers, video game consoles, and other devices to the internet. 

 Parallel port : In computing, a parallel port is a type of interface found on early


computers for connecting peripherals. The name refers to the way the data is sent;
parallel ports send multiple bits of data at once, as opposed to serial communication, in
which bits are sent one at a time.
 USB Port : A USB port is a standard cable connection interface for personal
computers and consumer electronics devices. USB stands for Universal Serial
Bus, an industry standard for short-distance digital data communications. USB
ports allow USB devices to be connected to each other with and transfer
digital data over USB cables. LAN port: ( Local Area Network) A LAN port, also known
as a network port or network connection, is a socket used to connect computers,
servers, video game consoles, and other devices to the internet.

Lan Port : ( local area network ) A LAN port, also known as a network port or network
connection, is a socket used to connect computers, servers, video game consoles, and other
devices to the internet.

You might also like