O'Reilly logo

Biometrics for Network Security by Paul Reid

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Protecting Privacy with Biometrics and Policy

The encroachment by technology into individual privacy has never been greater. From being tracked by surveillance cameras as we travel through cities and businesses to the use of customer loyalty programs, our movements and habits are under constant surveillance. The lack of personal anonymity is decreasing quickly as more personal information is gathered about us. This gathering and tracking can begin as soon as we turn on our cell phones in the morning. The cell phone puts out a “here I am” signal to the nearest cell phone towers. Using the strength of the signals at each tower, your location can be triangulated. On the drive to work, you may have a transponder in your car, to whisk you ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required