SlideShare une entreprise Scribd logo
1  sur  10
AGENDA
• INTRODUCTION
• APPLICATION
• DIFFERENT TECHNIQUES
• LIMITATIONS
• SOLUTIONS
• REFERENCES
• IN COMPUTER SECURITY, LOGGING IN (OR LOGGING ON OR SIGNING IN OR SIGNING ON) IS
THE PROCESS BY WHICH AN INDIVIDUAL GAINS ACCESS TO A COMPUTER SYSTEM BY
IDENTIFYING AND AUTHENTICATING THEMSELVES.
•OS login System1 •Web Login System2 • Apps Login System3
Security login have many applications like website login , bank login security ,
mobile apps and desktop apps login system ,
Operating system login security ,
like windows login & mobile screen lock Security,
---------------------This is the main types / categories of security login
DIFFERENT TECHNIQUES FOR LOGIN
• 1 PASSWORD
• 2 FINGER PRINTS
• 3 VOICE RECOGNITION
• 4 FACIAL RECOGNITION
• 5 IRIS RECOGNITION
INTEGRATORFAVORITEACCESSBIOMETRIC
FACIAL RECOGNITION:
2D RECOGNITION IS AFFECTED BY CHANGES IN LIGHTING, THE PERSON’S HAIR, THE AGE, AND IF THE PERSON
WEAR GLASSES.
REQUIRES CAMERA EQUIPMENT FOR USER IDENTIFICATION; THUS, IT IS NOT LIKELY TO BECOME POPULAR
UNTIL MOST PCS INCLUDE CAMERAS AS STANDARD EQUIPMENT.
VOICE RECOGNITION :
• A PERSON’S VOICE CAN BE EASILY RECORDED AND USED FOR UNAUTHORIZED PC OR NETWORK.
• AN ILLNESS SUCH AS A COLD CAN CHANGE A PERSON’S VOICE, MAKING ABSOLUTE IDENTIFICATION
DIFFICULT OR IMPOSSIBLE.
BEST SOLUTION
• DNA RECOGNITION ( FOR ADVANCE SECURITY SYSTEM )
• VERY HIGH ACCURACY.
• IT IMPOSSIBLE THAT THE SYSTEM MADE MISTAKES.
• IT IS STANDARDIZED
REFERENCES
WWW.WIKIPEDIA.ORG
HTTPS://IPVM.COM/SECTION/FACIAL%20RECOGNITION
THANK YOU.
MOHIBULLAH.SAIL@GMAIL.COM

Contenu connexe

Tendances

truMe for co working spaces
truMe for co working spacestruMe for co working spaces
truMe for co working spacesAthulJojo1
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access managementAthulJojo1
 
E capture movie (PDF version)
E capture movie (PDF version)E capture movie (PDF version)
E capture movie (PDF version)Stijn Van Loo
 
e-capture.net feature tour
e-capture.net feature toure-capture.net feature tour
e-capture.net feature tourStijn Van Loo
 
truMe for exhibition centres
truMe for exhibition centrestruMe for exhibition centres
truMe for exhibition centresAthulJojo1
 
E capture movie (updated)
E capture movie (updated)E capture movie (updated)
E capture movie (updated)Stijn Van Loo
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threadsLeena Reddy
 
What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?Chetu
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Visitor management system for government buildings
Visitor management system for government buildingsVisitor management system for government buildings
Visitor management system for government buildingsAthulJojo1
 

Tendances (17)

truMe for co working spaces
truMe for co working spacestruMe for co working spaces
truMe for co working spaces
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
truMe for visitor access management
truMe for visitor access managementtruMe for visitor access management
truMe for visitor access management
 
E capture movie (PDF version)
E capture movie (PDF version)E capture movie (PDF version)
E capture movie (PDF version)
 
e-capture.net feature tour
e-capture.net feature toure-capture.net feature tour
e-capture.net feature tour
 
truMe for exhibition centres
truMe for exhibition centrestruMe for exhibition centres
truMe for exhibition centres
 
E capture movie (updated)
E capture movie (updated)E capture movie (updated)
E capture movie (updated)
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control PanelsmartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
smartXS: 2 Door 2 Reader & 4 Door 4 Reader Access Control Panel
 
What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?What are the Different Types of Software Security Solutions?
What are the Different Types of Software Security Solutions?
 
Access-control-system
Access-control-systemAccess-control-system
Access-control-system
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
ESET_MOBILE_SECURITY_for-android
ESET_MOBILE_SECURITY_for-androidESET_MOBILE_SECURITY_for-android
ESET_MOBILE_SECURITY_for-android
 
Mobile security
Mobile securityMobile security
Mobile security
 
Access Control
Access ControlAccess Control
Access Control
 
Layers of control
Layers of controlLayers of control
Layers of control
 
Visitor management system for government buildings
Visitor management system for government buildingsVisitor management system for government buildings
Visitor management system for government buildings
 

Similaire à Security login

Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paperMaheshSwami19
 
ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iPrecisely
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.pptAnshikaGoel42
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityPrecisely
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancyDevam Shah
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware AuthenticationCoder Tech
 
Blancco Mobile Device Eraser
Blancco Mobile Device EraserBlancco Mobile Device Eraser
Blancco Mobile Device EraserJemma Elliott
 
Predstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetjaPredstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetjaDejan Pogačnik
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos De Pedro
 
ISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfCCNAAccount
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 

Similaire à Security login (20)

Database Security Login
Database Security LoginDatabase Security Login
Database Security Login
 
Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paper
 
ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release Highlights
 
Lock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM iLock it Down: Access Control for IBM i
Lock it Down: Access Control for IBM i
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
InformationSecurity.ppt
InformationSecurity.pptInformationSecurity.ppt
InformationSecurity.ppt
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Monitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and SecurityMonitoring and Reporting on IBM i Compliance and Security
Monitoring and Reporting on IBM i Compliance and Security
 
Single sign on - benefits, challenges and case study : iFour consultancy
Single sign on - benefits, challenges and case study :  iFour consultancySingle sign on - benefits, challenges and case study :  iFour consultancy
Single sign on - benefits, challenges and case study : iFour consultancy
 
Hardware Authentication
Hardware AuthenticationHardware Authentication
Hardware Authentication
 
Blancco Mobile Device Eraser
Blancco Mobile Device EraserBlancco Mobile Device Eraser
Blancco Mobile Device Eraser
 
Predstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetjaPredstavitev Kaspersky Small Office Security za mala podjetja
Predstavitev Kaspersky Small Office Security za mala podjetja
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 
ISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdfISC2_Cyber_Security_Notes.pdf
ISC2_Cyber_Security_Notes.pdf
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Ways to protect From Keyloggers!
Ways to protect From Keyloggers!Ways to protect From Keyloggers!
Ways to protect From Keyloggers!
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 

Plus de Mohibullah Saail

professional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineeringprofessional Issues in COmputer science and Engineering
professional Issues in COmputer science and EngineeringMohibullah Saail
 
Applications security and Artificial Intelligence
Applications security and Artificial Intelligence Applications security and Artificial Intelligence
Applications security and Artificial Intelligence Mohibullah Saail
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementationMohibullah Saail
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its ComponentsMohibullah Saail
 

Plus de Mohibullah Saail (8)

professional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineeringprofessional Issues in COmputer science and Engineering
professional Issues in COmputer science and Engineering
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
Applications security and Artificial Intelligence
Applications security and Artificial Intelligence Applications security and Artificial Intelligence
Applications security and Artificial Intelligence
 
Access control
Access controlAccess control
Access control
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementation
 
Secure hash function
Secure hash functionSecure hash function
Secure hash function
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its Components
 
Threshold cryptography
Threshold cryptographyThreshold cryptography
Threshold cryptography
 

Dernier

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Dernier (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Security login

  • 1.
  • 2. AGENDA • INTRODUCTION • APPLICATION • DIFFERENT TECHNIQUES • LIMITATIONS • SOLUTIONS • REFERENCES
  • 3. • IN COMPUTER SECURITY, LOGGING IN (OR LOGGING ON OR SIGNING IN OR SIGNING ON) IS THE PROCESS BY WHICH AN INDIVIDUAL GAINS ACCESS TO A COMPUTER SYSTEM BY IDENTIFYING AND AUTHENTICATING THEMSELVES.
  • 4. •OS login System1 •Web Login System2 • Apps Login System3 Security login have many applications like website login , bank login security , mobile apps and desktop apps login system , Operating system login security , like windows login & mobile screen lock Security, ---------------------This is the main types / categories of security login
  • 5. DIFFERENT TECHNIQUES FOR LOGIN • 1 PASSWORD • 2 FINGER PRINTS • 3 VOICE RECOGNITION • 4 FACIAL RECOGNITION • 5 IRIS RECOGNITION
  • 7. FACIAL RECOGNITION: 2D RECOGNITION IS AFFECTED BY CHANGES IN LIGHTING, THE PERSON’S HAIR, THE AGE, AND IF THE PERSON WEAR GLASSES. REQUIRES CAMERA EQUIPMENT FOR USER IDENTIFICATION; THUS, IT IS NOT LIKELY TO BECOME POPULAR UNTIL MOST PCS INCLUDE CAMERAS AS STANDARD EQUIPMENT. VOICE RECOGNITION : • A PERSON’S VOICE CAN BE EASILY RECORDED AND USED FOR UNAUTHORIZED PC OR NETWORK. • AN ILLNESS SUCH AS A COLD CAN CHANGE A PERSON’S VOICE, MAKING ABSOLUTE IDENTIFICATION DIFFICULT OR IMPOSSIBLE.
  • 8. BEST SOLUTION • DNA RECOGNITION ( FOR ADVANCE SECURITY SYSTEM ) • VERY HIGH ACCURACY. • IT IMPOSSIBLE THAT THE SYSTEM MADE MISTAKES. • IT IS STANDARDIZED