Biometric Protection Methods in Information Security
X. o‘g‘li |. Journal of Ethics and Diversity in International Communication, 3 (4):
62-66(April 2023)
Abstract
Today, modern information security and cyber security are aimed at reducing the risks for this strong security solution: traditional passwords have long been a weak point for security systems. Biometrics aims to answer this question by connecting the identification of the person with our body and behavior. In the current era of information exchange, the requirements for information security are high, including ensuring the security of systems by implementing biometric authentication of biological features.
%0 Journal Article
%1 noauthororeditor
%A o‘g‘li |, Xayitov Azizjon Mo‘minjon
%D 2023
%J Journal of Ethics and Diversity in International Communication
%K authentication, biological biometric biometric, identification information of security, systems systems, users
%N 4
%P 62-66
%T Biometric Protection Methods in Information Security
%U https://openaccessjournals.eu/index.php/jedic/article/view/2076/1972
%V 3
%X Today, modern information security and cyber security are aimed at reducing the risks for this strong security solution: traditional passwords have long been a weak point for security systems. Biometrics aims to answer this question by connecting the identification of the person with our body and behavior. In the current era of information exchange, the requirements for information security are high, including ensuring the security of systems by implementing biometric authentication of biological features.
@article{noauthororeditor,
abstract = {Today, modern information security and cyber security are aimed at reducing the risks for this strong security solution: traditional passwords have long been a weak point for security systems. Biometrics aims to answer this question by connecting the identification of the person with our body and behavior. In the current era of information exchange, the requirements for information security are high, including ensuring the security of systems by implementing biometric authentication of biological features.},
added-at = {2023-09-19T15:00:15.000+0200},
author = {o‘g‘li |, Xayitov Azizjon Mo‘minjon},
biburl = {https://www.bibsonomy.org/bibtex/22c11c0c9d1938ca8b932c9e03f6f695d/openaccess_20},
interhash = {d290620ca148b46922c5303b33f14064},
intrahash = {2c11c0c9d1938ca8b932c9e03f6f695d},
issn = {2792-4017},
journal = {Journal of Ethics and Diversity in International Communication},
keywords = {authentication, biological biometric biometric, identification information of security, systems systems, users},
language = {english},
month = apr,
number = 4,
pages = {62-66},
timestamp = {2023-09-19T15:00:15.000+0200},
title = {Biometric Protection Methods in Information Security},
url = {https://openaccessjournals.eu/index.php/jedic/article/view/2076/1972},
volume = 3,
year = 2023
}