Biometrics (or biometric authentication) consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.
My Experience:
When I worked in Ortigas, as a Call Center Agent, in Global -Sky, Inc. that was my first time I used the biometric. We are using that whenever we log in or enter in the office, whenever we have breaks and every time we log out or end of our shift. That biometrics helps the Finance officer to determine what time we log in and what time we log out.
Encryption
Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encryptedinformation (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process,decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted).
credit from youtube
Firewall
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
![]() |
| credit from google |
Access Control Software
Access control is a system that enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure.

No comments:
Post a Comment