Different Employee Identification Techniques Essay

Total Length: 464 words ( 2 double-spaced pages)

Total Sources: 1+

Page 1 of 2

Identification Methods

In a physical security system, there are a number of different ways to identify employees for the purpose of granting them different levels of access to parts of a facility. In many instances, a combination of methods will be used for maximum effectiveness. Passcards are usually one of the lowest levels of identification. They are easy to create and implement, but they have a key weakness in that they are transferrable. As such, a passcard offers only the lowest level of security.

Because of this, security professionals look at things that are unique to an individual, but are not transferable. This typically involves some form of biometrics -- retina scans, iris texture scans, fingerprints, facial recognition, voice recognition or even the shape of your ear (Moren, 2014). Things like body shape and gait recognition have also been explored, as a means of identifying a person based on what are presumed to be unique traits (Boulgouris et al., 2005). There have also been attempts to utilize things like handwriting analysis as a means of biometric analysis, based on analysis of texture (Zhu, Tan and Wang, 2000).

Stuck Writing Your "Different Employee Identification Techniques" Essay?



Retina and fingerprint scans are among the more common biometric methodologies in use, however. Both are long-established technologies that are relatively cheap, and relatively foolproof. They are not entirely foolproof, however, which is why many companies prefer to utilize more than one method, such as combining a swipe card with a retina scan, or using multiple biometric methods.

There are concerns with these systems, however, as people might seek to gain access to the files containing critical biometric information, and find a way to replicate that information for input at an access point. Thus, even biometrics are posing a challenge for people involved in IT security. They are better than other methods, but not foolproof (de Chant, 2013). All told, most organizations are moving towards biometrics because they are effective. The fact that fingerprints and facial recognition are in common use -- at borders, on electronic devices, has made the use of biometrics mainstream at this point, and companies are taking advantage of this to increase their use of such secure techniques......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Different Employee Identification Techniques" (2016, April 12) Retrieved May 22, 2025, from
https://www.aceyourpaper.com/essays/different-employee-identification-techniques-2158515

Latest MLA Format (8th edition)

Copy Reference
"Different Employee Identification Techniques" 12 April 2016. Web.22 May. 2025. <
https://www.aceyourpaper.com/essays/different-employee-identification-techniques-2158515>

Latest Chicago Format (16th edition)

Copy Reference
"Different Employee Identification Techniques", 12 April 2016, Accessed.22 May. 2025,
https://www.aceyourpaper.com/essays/different-employee-identification-techniques-2158515