Generic Architecture for Biometric and Digital Forensic Analysis
Ifeoma U. Ohaeri1, Obeten O. Ekabua2
1Miss Ifeoma Ohaeri, Department of Computer Science, North-West University, Mafikeng Campus, Private Bag X2046, Mmabatho 2735, South Africa.
2Prof. Obeten Ekabua, Department of Computer Science North-West University, Mafikeng Campus, Private Bag X2046, Mmabatho 2735, South Africa

Manuscript received on January 02, 2014. | Revised Manuscript received on January 04, 2014. | Manuscript published on January  05, 2014. | PP: 68-76 | Volume-4 Issue-6, January 2014. | Retrieval Number: F2472014615/2015©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Information Systems and Network Communications has become part of our everyday life. In recent times, there has been a massive growth in computer and electronic devices as well as network-based systems either for e-commerce, e-government or internal processes within organizations. Human beings can no longer be separated from electronic devices and the internet technology. The need for information security is increasing rapidly as a result of the amount of information made available on systems and networks which are connected on the internet. The dependence on information systems and the data that is stored, processed, and transmitted by them has recorded a tremendous increase in the rate of cyber-crimes; rise of information warfare, and threat of cyber terrorism which has even led many companies, organizations and even nations to thoroughly investigate the protection of its critical infrastructures from information, systems, and network based attacks. Therefore, it is very essential to provide an effective security measure and system that ensures the confidentiality, integrity, and availability of information systems, networks, and the services and resources made available. This can be achieved using biometric and digital forensic technology (BDFT).
Keywords: About four key words or phrases in alphabetical order, separated by commas.