Realistic authentication also called biometrics authentication is made use of in computer science usually as a means of access control and identification. It is used in identify people in various groups that are closely surveilled.

Biometric identification is big part of computer security, so for more information you can read this computer security essay. Biometric identifiers are measurable, distinctive characteristics that are used in labelling and describing people. The biometric identifiers are grouped as behavioral versus physiological characteristics. The characteristics that are physiological are often related to the body shape. Examples are: but not limited to palm veins, fingerprint, face recognition, palm print, DNA, iris recognition, retina, hand geometry and scent. Characteristics that are behavioral are in relation to a person’s pattern of behavior, including typing, gait, rhythm and voice.

Some traditional means of control access are identification systems that are token-based, for example a passport or a driver’s license, and identification systems that are knowledge-based, which include a personal identification number and a password. Because the biometric identifiers are often individually unique, they are reliable in identity verification than knowledge-based and token methods; nevertheless, the biometric identifiers collection raises the privacy concerns on the final use of the information.

On the other hand, personal identification number pronounced “pin” is a password that is numeric and often used in authenticating a given user to a particular system. PINs are normally used with systems of the bank in authenticating the cardholder identity, but are used in non-financial systems.

Biometrics over pin and password authentication

Most people will set passwords to digits or words they will remember easily examples are birthdays and names of family members, their favorite music or movie stars, and even dictionary words (Vacca, 2007, p:80). These passwords are very easy to crack either by guessing that is brute force attack and is based on the dictionary or simply guessing. Although it is advisable, to keep distinct passwords for various applications and change them repeatedly, most people will use a particular password in distinct applications and usually never change (Reid, 1963, p: 171). When a single password is impaired it can cause a security break in many of the user’s applications. An example, a particular hacker may develop a web site luring users with pornography and air miles that are free if they are to register with a password and a login name. The hacker may succeed in making use of the same password and login name to attack the corporate accounts of the users (Rao, 1952, p: 66)

On the other hand, biometrics and online systems recognition that are biometrics-based will need the person that is being recognized to be available at the very point of recognition (Stafford, 1991, p: 31). The biometrics are very hard for the users to repudiate and forge by attackers. In addition, the level of security is equal for all the users in a particular system, meaning that a given account is not any easier to crack compared to another (Passwords, 2011, p: 96)


More accurate identification: security systems that are traditional are normally reliant on smart cards, personal identification numbers (PINs) or passwords one can reach accuracy that is of a high level with use of systems that are biometric (Young, 1977, p: 79). If a particular system is correctly set up, one can decide to use characteristics that are biological like iris scans and fingerprints, which will offer one an accurate and unique method of identification. These particular features will not be duplicated easily, hence, meaning only the person authorized will get access and one will get high security level (Nelson, 2011, p: 67)

Accountability: The biometric log-ins normally mean that a person will be connected directly to a particular event or action (Zhang, 2002, p: 41). This means that the biometrics create a definable and clear audit trail of the activities or transactions (Reid, 2004, p: 77). This comes in handy especially in a case of  breaches in security since you will know who exactly is will be responsible for the breach, unlike when using pins and passwords, as anyone who might have got an access to a pin or a password may gain access to a given system. As a result of the biometrics you get complete and true accountability, which will never be duplicated (Minton, 2014, p: 131)

Increased security: The technology of biometry can provide more security when compared to authentication methods that are traditional. The presence of an authorized person physical is needed at the identification point. This will mean that only an authorized person will have access to the given resource (Mayoral, 2013, p: 101). An effort put by individuals to handle many passwords has resulted to most choosing general or easy words, with a number writing the passwords and pins in places that are conspicuous (International Workshop on Biometric Recognition Systems, 2005, p:75). This vulnerability is what leads to the passwords being easily compromised and guessed. In addition, passwords are easily stolen because it is something that you may have. In contrast, it is close to impossible for biometrics’ data to be stolen or even guessed in the same means as pins or passwords (Maltoni, 2005, p:179)

Increased convenience: A great reason as to why passwords are kept simple sometimes is due to the fact that they can be forgotten easily. To enable increased security, many users of the computer are tasked to handle many passwords and this in turn will increase the tendency of the users to forget the passwords or pins (Rose, 1974, p: 49). Since technologies that are biometric are normally based on what you are, this makes them close to impossible to manage or forget. This particular characteristic permits biometrics to give more a lot more convenience than the other means which have a basis on remembering many passwords (In Pato, 2010, p:89). Biometrics may simplify greatly the process that is normally involved in authenticating as it reduces the user’s burden and also the system administrator’s burden. Authentication that is biometric also permits for an association that is of higher level privileges and rights with an authentication that is successful (Schuckers, 2010, p: 200). Information that is of a high sensitivity is be made readily available in a biometrically protected network than that which is protected by use of pins and passwords. This increases the user’s convenience as he or she can access protected data with no need of having human intervention (Jakobsson, 2007, p: 303)

Increased answerability: authentication methods that are traditional for example PINs and passwords may be shared to unauthorized users hence rising the likelihood of unaccountable access. Majority of organizations share passwords that are common among the administrators so as to facilitate administration of the system (In Ling, 2015, p: 48). Through bad luck, due to the fact that there is no certainty as to whom at a given time is making use of the shared pin or password, accountability is greatly reduced. In addition, a user of the password or pin shared may be unauthorized and sharing would make it harder to verify, the system’s security is also minimized.

Increase in awareness of security in various organizations and applications that are being used has however resulted to requirement for stronger and more reliable reporting and auditing (Vielhauer, 2006, p: 206). By deploying biometrics which are to secure computers access and many other facilities will eliminate the occurrence of these buddy-punching and would provide an increased certainty level as to whom had accessed which computer and at what time (Elsworth, 2010, p: 102)

Time saving: identifications that are biometric is very quick, this is another advantage the biometric system has over PINs and passwords system. An individual can be rejected or identified in seconds by the system (Rosenvold, 2005, p: 142). Unlike in a password or PIN system where unauthorized user might be tempted to do some guessing on basis of luck, this will result to wastage of time hence decreased productivity. For the business owners who understand how valuable time management is, use of this particular technology will be of advantage to revenue of the office by enhancing productivity and even reduction of costs by eliminating waste and fraud (Cantoni, 2015, p: 56)

Systems that are user friendly: One can have systems of biometrics installed easily and later they would do their jobs rather reliably, uniformly and quickly. You will however need just a minimum training on how to get the system to operate (Wayman, 2005, p: 25). This is unlike in pins and password scenario, where you will be required to have expensive password and PIN administrators. If high quality systems are used, this will in turn translate to reduced costs on maintenance so as to reduce expenses of having to maintain a system that is ongoing (Biometric Society, 1945, p: 45)

Scalability: Biometric systems are quite easily scalable and flexible. You can either use progressed versions of security systems or sensors on the basis of your requirements (Woodward, 2001, p: 62). On the very lowest level you may use indiscriminative characteristics; nevertheless, if you look for an increased security level for databases that are large scale, you may have to use systems that have more features that are discriminable, or applications that are multi-modal so as to increase the accuracy of identification (American Statistical Association, 1947, p:123). This is unlike the PINs and passwords system which are limited to entering a number of characters, that will in turn get you access to a system. PINs and passwords are limited to numbers and letters and there is no other way out unlike in the biometric systems, here we have various technology such as; facial recognition, fingerprint identification, hand geometry just to name but a few (Burnett, 2006, p: 3)

There is an option for tracking employees: because the biometrics systems are automated therefore tracking data is easy to carry out, the biometrics give managers and employers opportunities for close supervision in concern to the daily operations and activities (Traore, 2012, p:50). Certain transactions, events and even other activities are usually linked to a particular person hence making it very much possible for employers to trace chains of events (IGI Global, 2017, p: 203). Biometrics can contribute towards cutting down, significantly on practices made by dishonest employees that may eat away the bottom line of a company, these include buddy punching and various other means of fraud. Passwords and pins on the other hand are not part of a person, unlike fingerprints and iris and DNA which are used in biometrics, hence making it hard to carry out tracking of employees in a company, as in the case of biometrics (Baudrillard, 2003, p: 2)


From the above points, we have seen that one can fore deal from systems that are biometrics to a very big extent and even abolish the need for people to remember PINs and passwords. Rather, one can present information on biometrics that is unique and gain access. Job will be performed accurately, with minimal training, with a quick schedule of implementation and the job will be quick.