Technology Computer & Networking security

Biometric Authentication Services to Strengthen Information Security

Cyber-attackers use automated hacking tools and techniques to breach computer networks and systems. Negligence by Internet users only adds to the convenience of the hackers. Password authentication is crucial for ensuring data integrity and confidentiality. However, many Internet users continue to be careless in their approach to information security. Use of predictable passwords and the habit of using same password on multiple websites serves as an open invitation for hackers to gain access to sensitive personal information. Recently, security management solutions company, InMezzo announced collaboration with the University of Kent to evolve biometric authentication services.

The primary purpose behind the initiative is to ensure security of telecare applications. Telecare applications are used in care environments for the older and disabled people. InMezzo and University of Kent endeavor to develop a multi-factor authentication service, which would recognize people by their voices and faces. The service may not only strengthen the defenses against hacking attacks, but also add to the convenience of the elderly and the disabled.

InMezzo and University of Kent have successfully won a bid to install secure information security systems under a national program in the United Kingdom. An organization named Technology Strategy Board is contributing resources for the program.

Students of the University of Kent's School of Engineering and Digital Arts are undertaking research to devise different pattern recognition techniques, which may aid in identifying people through their faces, voice, eye scans and fingerprints.

The biometric authentication systems will facilitate the disadvantaged to gain easy access to telecare systems and applications.

Government agencies and private firms may launch similar programs to strengthen the defenses against threats in the IT environment. Security vendors may also collaborate with educational institutions, Universities and research bodies to develop innovative IT security mechanisms. Incentive schemes by government bodies may also encourage researchers to evolve new Internet security mechanisms.

SHARE
RELATED POSTS on "Technology"
Use Online Backup to Keep Your Valuable Data Safe
Use Online Backup to Keep Your Valuable Data Safe
'Problem occurred while doing OST sync operation' Error and Recovery
'Problem occurred while doing OST sync operation' Error and Recovery
Data Recovery - Important Factors to Consider
Data Recovery - Important Factors to Consider
Email Spam Protection Quite Essential To Help Cut The Time And Money Due To Manpower Use
Email Spam Protection Quite Essential To Help Cut The Time And Money Due To Manpower Use
Remove Feed Helperbar Redirect Virus From Windows and Mac OS X
Remove Feed Helperbar Redirect Virus From Windows and Mac OS X
Check System And Get Ensure: How To Make Your Windows PC Spyware Free
Check System And Get Ensure: How To Make Your Windows PC Spyware Free
Speed Up XP Software - Download Right Now!
Speed Up XP Software - Download Right Now!
The Right Time To Use A Registry Cleaner Windows XP Optimizer
The Right Time To Use A Registry Cleaner Windows XP Optimizer
Stop Piracy and Use CD Duplication Service for Creating Largest Number of Discs
Stop Piracy and Use CD Duplication Service for Creating Largest Number of Discs
Migrate Contacts From Lotus Notes to Outlook Exchange Server 5.5 or Exchange 2000
Migrate Contacts From Lotus Notes to Outlook Exchange Server 5.5 or Exchange 2000
Guide On How To Make Low Priced But Required Components In Creating Basement Insulation For Any Time
Guide On How To Make Low Priced But Required Components In Creating Basement Insulation For Any Time
Remove Ddos Clean: To Get Rid of Fake Anti Spyware Program
Remove Ddos Clean: To Get Rid of Fake Anti Spyware Program
How to Get Rid of Spyware on My Computer
How to Get Rid of Spyware on My Computer
How to Avoid a Malware Infection?
How to Avoid a Malware Infection?
Outstanding Registry Cleaner
Outstanding Registry Cleaner
Why You Should Be Using Vipre Internet Security?
Why You Should Be Using Vipre Internet Security?
Run Data Recovery Software to Restore Data from RAW USB Hard Drive?
Run Data Recovery Software to Restore Data from RAW USB Hard Drive?
How to Remove Virus Protector Spyware Automatically-Manually
How to Remove Virus Protector Spyware Automatically-Manually
Data Recovery of IBM Drive
Data Recovery of IBM Drive
What Are the Best Registry Cleaners For Windows?
What Are the Best Registry Cleaners For Windows?
Protect Your Laptop and the Data It Holds
Protect Your Laptop and the Data It Holds

Leave Your Reply

*