Tan 1 Firstname, Lastname CSC354, Introduction to Software Engineering Dr. Joo Tan 8/20/12 Paper Topic Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems. A fingerprint reader captures the curves and indentations of a fingerprint. Fingerprint readers can be set up to perform different functions for different fingers. For example, the index finger could start a program, and the ring finger could shut down the computer (Jenkins). Fingerprint readers usually cost less than $100, making it easy for people to use them in personal and business environments. Newer computer models include internal fingerprint readers for added security. External fingerprint readers usually are connected to a USB port on the computer (Parlor). A biometric security device used in high security areas is an iris recognition system. Iris recognition systems read patterns in the iris of the eye. These patterns are as unique as a fingerprint. Iris recognition systems are quite expensive and are used by government security organizations, the military, and financial institutions that deal with highly sensitive data (Doe)1. 1 Some organizations use retinal scanners, which work similarly but instead scan patterns of blood vessels in the back of the retina. Tan 2 Biometric technology is a very effective way to keep information secure. Biometric technology is used in several different ways. Two widely known biometric devices are fingerprint readers and iris recognition systems. With biometric technology, the world can be more secure. Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems. A fingerprint reader captures the curves and indentations of a fingerprint. Fingerprint readers can be set up to perform different functions for different fingers. For example, the index finger could start a program, and the ring finger could shut down the computer (Jenkins). Fingerprint readers usually cost less than $100, making it easy for people to use them in personal and business environments. Newer computer models include internal fingerprint readers for added security. External fingerprint readers usually are connected to a USB port on the computer (Parlor). A biometric security device used in high security areas is an iris recognition system. Iris recognition systems read patterns in the iris of the eye. These patterns are as unique as a fingerprint. Iris recognition systems are quite expensive and are used by government security organizations, the military, and financial institutions that deal with highly sensitive data (Doe)2. Biometric technology is a very effective way to keep information secure. Biometric technology is used in several different ways. Two widely known biometric devices are 2 Some organizations use retinal scanners, which work similarly but instead scan patterns of blood vessels in the back of the retina. Tan 3 fingerprint readers and iris recognition systems. With biometric technology, the world can be more secure. Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Tan 4 Works Cited According to MLA style, you must have a Works Cited page at the end of your research paper. All entries in the Works Cited page must correspond to the works cited in your main text. Refer to: http://owl.english.purdue.edu/owl/resource/747/05/ for guidelines.