CG3.11 Data Security and Integrity Processes

?
  • Created by: mrkhan
  • Created on: 10-03-16 15:24
Retina Scans
Low power infra-red beam is projected onto the pattern of blood vessels at the back of the eye. Highly reliable as no two people have the same … patterns.
1 of 5
Iris Scan
The pattern of the … in the eye is scanned.
2 of 5
Fingerprint recognition
Every person has their own individual …. Some laptops have these scanners built in to authenticate a user.
3 of 5
Face recognition
The shape of a person’s ….. Can be scanned and compared with stored data.
4 of 5
Voiceprint recognition
Identifying a person from the quality of what they sound like
5 of 5

Other cards in this set

Card 2

Front

Iris Scan

Back

The pattern of the … in the eye is scanned.

Card 3

Front

Fingerprint recognition

Back

Preview of the front of card 3

Card 4

Front

Face recognition

Back

Preview of the front of card 4

Card 5

Front

Voiceprint recognition

Back

Preview of the front of card 5

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Communication and networking resources »