Computer Security System / technology have passed through several changes. The trends have been from what you know (e.g. password, PIN, etc) to what you have (ATM card, Driving License, etc) and presently to who you are (Biometry) or combinations of two or more of the trios. This technology (biometry) has come to solve the problems identified with knowledge-based and token-based authentication systems. It is possible to forget your password and what you have can as well be stolen. The security of determining who you are is referred to as BIOMETRIC. Biometric, in a nutshell, is the use of your body as password. This paper explores the various methods of biometric identification that have evolved over the years and the features used for each modality.
The breakthrough in communication technology, especially that of GSM phones, in Nigeria is one of the best things that has happened to the nation in terms of its technological advancement. In Nigeria, GSM means Telecom Explosion. The GSM revolution began in August 2001 and changed the face of Information and Communications Technology in Nigeria. It is much easier to reach anybody that you have his / her number, whether they are in the village or in their closet unless in a place where there is no network of the service provider. As revolutionary as GSM may seem to be, its negative effect on our educational sector is of great concern. The ongoing war against examination malpractice is yet to take its toll on perpetrators as they have devised a new method to continue their game through the cell phone technology. Described as e-cheating, the cell phone technology is providing students a smart way to beat the best effort of stakeholders to stamp out the menace. This paper examines GSM technology, the various ways in which cell phones are employed to cheat and suggestions on how to stop e-cheating through cell phones
The major technique for admitting students to an examination over the years has been through the presentation of a token. The student possesses a physical and portable device which contains the user identity. Examples of such devices include ID cards, Library Cards, Fees Clearance Cards, Photo Cards, etc. However, this method of authenticating a student for an examination has an obvious problem. The problem is that object can be misplaced, stolen, forgotten at home or somewhere, and ID card can also be faked. This paper presents a multi-mode biometrics (fingerprint and face) solution to the problem of examination malpractice in Nigerian schools. The appearance of both fingerprint scanner and web cam on modern laptop and notebook computers motivate the writing of this paper.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.