answersLogoWhite

0


Best Answer

If you can obtain a piece of the person - you've got their DNA so it is possible by sleight of hand to impersonate someone else. Some other drawbacks:

DNA matching is not done in real-time

Intrusive: a physical sample must be taken, while other biometric systems only use an image or a recording

Civil liberty issues and public perception

Also, DNA is extremely complex stuff so biometric security systems that rely on it have a known risk of false negatives.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Why is a biometric security system that relies on DNA authentication vulnerable?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is functions of the biometric input devices?

Advantage: of using biometric device is is easy to save password and just a swipe you can sign in easy/ also you dont have to remeber any passwords for it just swipe your finger and done. Disadvantages: it does have some issue with with crashing and you might have to do a compltete reinstall but rarely happens/ sometimes it may take more then one swipe of you finger print to sign in.


Different between authentication and access control?

Authentication is the process of verifying the identity of a user, typically through credentials like usernames and passwords. Access control, on the other hand, is the practice of restricting and controlling user access to resources based on policies or rules, regardless of their identity. In essence, authentication verifies who you are, while access control determines what you are allowed to do or access.


What information security requirement relies upon two-factor authentication to confirm users are authorized?

any organization where AD is installed in the infrastructure uses this two-factor authentication to confirm users are authorized.The users are autenticated first and while logging in the system nearest DC is contacted to check the access level rights on resources and authorise the user. BLAH BLAH BLAH yada yada yada the answer is C. Remote Access (Correct!)


What organization information security requirement relies upon two-factor authentication to confirm users are authorized?

Remote Access


An online payment method that relies on SSL technology for customer security is called?

electronic wallets.


What is cisco's vpn protocol that relies on on IPSec for all its security needs?

Layer 2 Tunneling Protocol (L2TP)


An online payment method that relies on secure sockets layer ssl technology for customer security is called?

D. electronic wallet


Disadvantages wireless sensor networks?

One of the biggest disadvantages of large scale wireless sensor networks is the fact that they are vulnerable to unauthorized access. Also it relies on the complexity of logistics involving selective replacement of sensors.


Can a California resident collect unemployment if they are old enough to get Social Security benefits?

Neither relies on the other for eligibility. You have to qualify for each of them as they are separate programs with their own rules.


What is the process which relies on corrosion?

a process that relies on corrosion


Naturalism relies on what?

Naturalism relies on objectivity and detachment.


What is the disadvantage of budgeting?

Distortion is caused by cash budgets. Influence of non-financial factors will also affect the final decisions when it comes to cash budgets. Cash budgets are vulnerable to manipulations. The major disadvantage is that cash budget relies on estimates.