Page 74 - DCAP516_COMPUTER_SECURITY
P. 74

Computer Security




                    Notes          Many experts predict that user authentication will assume a major new network control function,
                                   filling the void left by telephone numbers to identify users for billing voice, data and multimedia
                                   services; define service assignments, such as three-way calling, incoming caller ID and voice
                                   messaging; and provide security.
                                   In an advanced, converged network of multiple user devices – desktops, laptops, personal
                                   digital assistants and cell phones – each conducting multiple simultaneous sessions with a
                                   dynamically assigned temporary client address, there will be an infinite mix of user authentication
                                   requirements to accurately and securely provide and bill services. Once user authentication has
                                   assumed this role, control of the network, from infrastructure to services, will have completed
                                   its migration to software.

                                   6.8 Biometrics

                                   Biometric devices authenticate users to access control systems through some sort of personal
                                   identifier such as a fingerprint, voiceprint, iris scan, retina scan, facial scan, or signature dynamics.
                                   The nice thing about using biometrics is that end-users do not lose or misplace their personal
                                   identifier. It’s hard to leave your fingers at home. However, biometrics have not caught on as
                                   fast as originally anticipated due to the false positives and false negatives that are common
                                   when using biometric technologies.
                                   Biometric authentication systems employ unique physical characteristics (or attributes) of an
                                   individual person in order to authenticate the person’s identity. Physical attributes employed in
                                   biometric authentication systems include fingerprints, hand geometry, handwritten signatures,
                                   retina patterns and voice patterns. Biometric authentication systems based upon these physical
                                   attributes have been developed for computer login applications.

                                                        Figure 6.2: Various Biometric Techniques








































          68                                LOVELY PROFESSIONAL UNIVERSITY
   69   70   71   72   73   74   75   76   77   78   79