
Network Security 289
Physical Characteristics of User
In this method, the physical characteristics, such as fingerprints, voice, length of fingers of hand, and
face structure of the users are used for the identification purpose. These characteristics of users are
known to be unique and have a very low probability of duplication. Thus, the security of the database is
relatively high in this scheme as compared to the password scheme. However, this method requires the
use of some special hardware and software to identify physical characteristics of the user, which incurs
extra cost to the organization.
Smart Card
In this method, a database ...