Fingerprint Recognition Software Use for Banking Security Essay

Fingerprint Recognition Software Use for Banking Security Essay

Length: 1930 words (5.5 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview

This research paper looks at the issues today surrounding identity theft and consumer fraud in the banking industry. It looks at how biometrics, or fingerprint recognition specifically, can help strengthen the security that banks provide for the safeguarding of the personal information of their customers. Because of banks being targets both online and offline for identity theft and consumer fraud, this paper discusses how business is done today and how their security may be enhanced with the implementation of fingerprint recognition software. The paper will discuss fingerprint recognition software, how it works, and how it can be beneficial in the banking industry. It will demonstrate how this software can be beneficial to banks and their customers doing online and offline business transactions. The advantages and possible disadvantages of fingerprint recognition software will be discussed and how it is increasing in the world today. The paper will demonstrate how business has changed towards an E-commerce environment and with that, how security risks online have increased. It discusses the importance of banks providing customers with online and mobile access to their accounts in the society we live in today. There are various methods utilized by thieves today for obtaining personal information online and offline. The paper will discuss a few of these methods and what consumers and banks can to do the help minimize their risk. The purpose of this paper is to show fingerprint recognition software as a development that can help reduce the number of identity thefts and consumer frauds that are occurring today.
Keywords: identity theft, consumer fraud, banking, fingerprint recognition, security, customer, personal informati...

... middle of paper ...

...lle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems.IBM Systems Journal, 40(3), 614-634. Retrieved from
Saleh, Z., PhD. (2013). The impact of identity theft on perceived security and trusting E-commerce. Journal of Internet Banking and Commerce, 18(2), 1-11. Retrieved from
Tassabehji, R., & Kamala, M. A. (2012). Evaluating biometrics for online banking: The case for usability. International Journal of Information Management, 32(5), 489. Retrieved from
Venkatraman, S., & Delpachitra, I. (2008). Biometrics in banking security: A case study. Information Management & Computer Security, 16(4), 415-430. doi:

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

The Necessity of Automated Fingerprint Identification System in Law Enforcement

- ... The use of fake fingers—made ofglue, latex, or silicone—is a well-publicized method to circumvent fingerprint systems. Altered fingerprints, however, are real fingers that are used to conceal one’s identity in order to evade identification by a biometric system. While fake fingers are typically used by individuals toadopt another person’s identity, altered fingers are used to mask one’s own identity. In order to detect attacks based on fake fingers, many software and hardware solutions have been proposed....   [tags: border control, algorithm, altered]

Strong Essays
1482 words (4.2 pages)

Essay about The world of Biometric Security

- The world of Biometric Security Biometrics is methods of recognizing a person based on a physiological or behavioral characteristic. Some of the features measured in biometrics identification that I will include in this paper are: fingerprints, retina, face, signature, and voice scans. Biometric technologies are quickly becoming the foundation for a large array of highly secure identification and personal verification techniques. As the level of security and transaction fraud increases, the need for more secure identification and personal verification technologies also increases....   [tags: Biometric Security Surveillance Papers]

Strong Essays
1827 words (5.2 pages)

Internet Security and Confidentiality Essay

- Table of contents: Aims: 2 Methodology: 3 Findings 4 Internet Security and Confidentiality: 4 User authentication: 4 Anti-virus protection: 4 Encryption: 5 Fire walls: 5 The range of service offered by ISPs: 6 The cost of the different packages: 6 Functionality: 6 Capacity: 6 Internet Connection and Access Methods: 7 Three broadband packages: 9 Vodafone simply broadband: 10 Unlimited 70Mb & Talk (Anytime) 10 Recommendation: 11 Conclusion: 12 Bibliography: 13   Aims: My aims are to require my evidence that will show me to understand of broad range of my learning outcomes in my project brief....   [tags: authentication, virus protection, encryption]

Strong Essays
2107 words (6 pages)

Security and the OSI Model Essay

- Abstract The Open Systems Interconnect (OSI) model is a standard reference model for the communication between two end users. Seven different layers make up the OSI model: physical, data link, network, transport, session, presentation, and application. This paper will cover the type of security that is associated with each level of the OSI model. Physical Layer The physical layer is where the actual communication occurs between devices. The security of the physical layer pertains to the actual hardware....   [tags: Networks Telecommunications]

Strong Essays
1586 words (4.5 pages)

Using Biometrics for Security Essay

- Using Biometrics for Security Today the protection of everything has become an important issue that affects everyone. Whether it’s protecting a cashier’s cash drawer or preventing a suicide bomber onto an aircraft. Either way there is going to be an increase and change in security. The advancement in the technology of computers has made it easier for people to get information. Today, a person can log onto the internet and view information on anything and everything. If an average person can do that then how secure is the internet....   [tags: Technology Safety Essays]

Free Essays
1317 words (3.8 pages)

Essay on Controls and Protective Mechanisms

- The use of protection mechanisms within Happy Health Systems will be an important component that contributes the physical and logical security of the organization. These mechanisms allow access controls to be placed at varying points of criticality throughout the organization where it is deemed necessary. Of particular importance, the access control mechanisms allow for the identification, authentication, authorization, and accountability of employees gaining access to secured areas and/or information....   [tags: Corporate Security]

Strong Essays
1570 words (4.5 pages)

Biometrics are New Technological Tools in Computer Security Essay

- As a result of the evolution in the field of biometric computer security tools, a new class of techniques and methods for user identification has erupted. Fingerprint and hand patterns, voice recognition, iris and facial scans, as well as skin patterns and smart cards, have all been used in justifying individuals on who they claim to be based on their unique characteristics. Although still relatively new, these innovative technologies are already being demanded by not only consumers but as well as the government to help find new methods of passport usage, border control, and mere security matters (Kooser, 2006, p.74)....   [tags: essays research papers]

Free Essays
1565 words (4.5 pages)

Creation and Verification of Paper Based Certificates with Signatures

- CREATION AND VERIFICATION OF THE PAPER BASED CERTIFICATES WITH SIGNATURE. Creation of Signature on the issuing Certificate According to Murthy et al. (2011), the vital information that has to input in this paper such as Unique no, Reg no, first name, middle name, last name, Father’s name, passing year and obtained marks) need to be considered as an input m. Then after, m is hashed with a secure hashing algorithm (SHA-1) to create a hash value md. The hash value md is then encrypted using the issuing authority private key and the digital signature is found to be encrypted value (ds)....   [tags: security, forgery, scanner]

Strong Essays
1603 words (4.6 pages)

Security, Software, and Ethics Essay

- Security, Software, and Ethics Introduction Every day, we use computer software to perform everyday tasks. These can range from sending e-mail, balancing your checkbook, web browsing, shopping and much more. Most people don't stop to think about the security of the software that we use on a daily basis. Users are more concerned about getting their work done, and security is little more than an afterthought. Security is a very important and often overlooked aspect of software development. Security is used to authenticate users, manage access to resources, and to ensure that data hasn't been compromised....   [tags: Software Computers Ethics Morals Essays]

Strong Essays
4406 words (12.6 pages)

Software Essay

- SOFTWARE A set of instructions that directs a computer's hardware to perform a task is called a program, or software program. Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system. The two main types of software are system software and application software. System software controls a computer's internal functioning, chiefly through an operating system , and also controls such peripherals as monitors, printers, and storage devices....   [tags: Computer Technology Software]

Strong Essays
1664 words (4.8 pages)