Professional Documents
Culture Documents
XCXXCXCXC
XCXXCXCXC
With the quickly developing society people are, a lot can change in a year
Technology, lifestyle and even people's means of communication, and with those who
strive for the good of humanity, there are those with a far more malicious intent.
Incidents such as hacking, phishing and or just plain invasion of privacy has been going
on for years, creating new ways to violate and gather any protected information or area.
Because of this the classic means of security may not be as secure as it was in the
past. Thus, people created a different way of securing vital information or just a means of
verifying oneself.
Biometrics is the technical term the refers to the measurement and calculation of
identification and access control. Biometrics consist of the word’s "bio" meaning "life"
and "metrics" which is "to measure", where biometrics as a whole directly translates to
Biometric Access control has gained acceptance over the years due to limited
success of physical checks in safeguarding vital assets in a world that grows more
dangerous by the day. This method has been used by governmental and private agencies
to secure their assets against theft and misuse by miscreants. Conditional access through
biometric security has become all the more important after the increasing incidences of
terrorist activities in the modern world. One such reliable system is the Fingerprint
Access Control, which uses Biometric fingerprints to provide conditional access to
individuals.
Biometrics systems only became apparent to people over the last few decades
however the main concept or idea of this dates back hundreds or even thousands of years
ago. One of the oldest and basic example characteristics used for recognition is by human
face. People have been using faces to identify both known and unfamiliar faces.
Other characteristics have also been used throughout the history of civilization as
a more formal means of recognition, such as handsprints left by cavemen which acted as
signatures, how in 500 B.C. fingerprints where used in Babylonian transactions recorded
in clay tablets and many more. And from those people continue to evolve, thinking of
different ways to recognize and authorize the right people until the late 1800s were a
method was developed to index fingerprints that provided the ability to retrieve record.
And it was then when true biometric systems began to emerge, 1990s had an explosion of
Thus, circles back to the present were people's everyday phones, gadgets and what
not have this feature the said phone only permits the authorized user to access it.
Different versions of phones provide different types of security ranging both from its
efficiency and variety. Were some phones will provide with fingerprint activated locks
only, some gives user face recognition and even voice recognition authorization pass.
Passwords and pins can be easily stolen and recovered if ever a locked phone got stolen
but if it was locked via fingerprint and/or and of the other security features that was
mentioned, gaining access to the phone will prove to be more difficult than the latter.
Biometric Security Systems ranges from people's physiological traits to voice
this, where a finger be place on the scanner to authenticate if it’s the owner. Face
recognition, as the name suggests, uses the camera function to authenticate and check the
users face in order to get access. Voice is the only available biometric identifier that can
be used over the telephone. Customers will become impatient if a number of security
questions is asked before authentication. One of the largest banks in India uses this Voice
Recognition Systems which judges their speech patterns to allow them perform
But one of the key reasons as why the researchers’ chose to pursue the study is
how effective or efficient it truly is in the realm of students in AMA Computer College
Cabanatuan, the respondents are most likely to be aware or maybe even knowledgeable
about Biometrics and its whole ordeal, thus make great potential source of data. Though
no matter how much people praise this type of security, like everything, it’s not perfect
by all means. And that's where the researchers' motivation stems from, to see the limits of
Biometrics, to see what it's advantages and disadvantage of it and thus find ways to
improve upon those flaws and give students better sense of privacy and security.
Significance of the Study
The information result of the study will provide and act as a guide to those who
Parents or Adults in general can also find a great deal of benefits from this
study. Like the previous one, being in a different and unsecure environment is really risky
especially in this generation, because of that having a system of security only accessible
by the actual owners will provide enough time for authorities to locate and secure the
Students will find great use of this considering phones and these devices will
give great aid during classes both as a form of information gatherer and as
communication. Some students attend school farther than their old one, or even
rent/board a room much closer to the school, thus being in a different environment people
Future Cyber Police Officers can benefit from this study. Due to the rise of
crime and thievery, being able to understand the premise of Biometric Security can
provide a huge step forward for those who are interested in taking this career choice.
Future Researchers will definitely find great benefit from this study if ever some
The research paper's goal is to expand and understand the limits and specialties of
the biometric functions installed in AMA Students' everyday devices, specifically aiming
Systems?
2. What are the advantages and disadvantages of the Biometric Security System?
This study seeks to identify to what extent biometrics can be secured, and how
well people can steal other’s identity. This study was carried out at the AMA Computer
College Cabanatuan Campus during the year 2019-2020. The researchers limited the
study to staff and students, who use biometrics security. The primary data gathering
method used was interview to determine the user’s perspective base on their experiences
and through their interaction with biometrics and the secondary was done through using
questionnaire.
REVIEW OF RELATED LITERATURE
This chapter presents the different related literature; both local and foreign, which
supports the researchers on this study. It is also a review of the existing literature relevant
Foreign Literature
Access control has been getting a lot more attention due to unsatisfactory results or
physical checks in safeguarding vital assets in the world and continue to be riskier as it
progresses. Thus, this method has been used by governmental and private agencies to
secure their assets against theft and misuse by miscreants has become all the more
important after the increasing incidences of terrorist activities in the modern world. One
such reliable system is the Fingerprint Access Control, which uses Biometric fingerprints
manner saying "Biometric Access Control is a security system that provides conditional
access after scanning for unique physical characteristics. A reader scans the face, fingers,
irises and veins for unique traits, converts the data into digital format (template) and then
uses a complex algorithm to make a match". Even remarking how experts praise it for
being foolproof and the possibility of it being misused are little to none. Biometric
Access is said to also improve attendance in not only in a school environment but also
August 2019 going on about how Biometrics enhances security. “Constantly using
passwords on a smartphone can be a pain, not to mention a high security risk. Luckily,
popular mobile browsers like Chrome and Firefox Lite are now supporting biometrics for
authentication to make logging in to social media, email, and online shopping accounts
easier and more secure. Here’s what you need to know about the Web Authentication
API". Then continue to cite different instances where Biometric Features that many
mobile users are not even aware of such as how Chrome, Windows, Mac, Linus and
Android are adding features where users can safely login via Sub, Bluetooth and NFC
devices connected through tables where users can verify accounts on the go.
cyberattacks by relying on facial scans, fingerprints and voice recognition. It’s says it can
provide users with more secure online transactions, Browser-based biometrics is starting
to revolutionize and streamline the steps in verifying online accounts. It promises to add
more security and ease in logging in and transacting on the internet. And in the end the
" Philippines plans biometric enrollment of 105 million people as Manila pilot’s facial
recognition ". Thus, showing how reliable this system is. The article states how The
Philippines is planning to register over a hundred million people in its biometric National
When public facial recognition was launched in Manila a pilot of cloud and
announcement. Multiple renowned services collaborated with each other to produce more
finance and resources went into this project and as well as time. In the end it shows how
much this investment will be worth it for the advancement of the country using the
Biometrics Systems.
"Philippine Police Get Fingerprint Identification System" saying how Philippine National
Police or PNP in Manila got a new weapon in their arsenal. Said weapon is the
enforcement.
AFIS revolves around the collection and matching of fingerprint biometric data. It
locally and beyond the country’s borders, similar to the FBI’s Next Generation
This article reinforces the idea how Philippines are keeping up with the most
reliable way of pursuing goals, biometrics can be used as a shield for protection at
unwanted attackers and how it can be used as a weapon to find or figure out who the
culprit is.