Page 197 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 197
Unit 13: Privacy Technological Impacts
2. When attempting to authenticate themselves, the user enters his login name or, Notes
alternatively, the user may provide a card/token containing identification information.
The user’s physical attribute is then measured.
3. The previously stored reference profile of the physical attribute is then compared with the
measured profile of the attribute taken from the user. The result of the comparison is then
used to either accept or reject the user.
4. Biometric systems can provide an increased level of security for IT systems, but the
technology is still less matures than memory or smart cards. Imperfections in biometric
authentication devices arise from technical difficulties in measuring and profiling physical
attributes as well as from the somewhat variable nature of physical attributes.
Example: A person’s speech pattern may change under stressful conditions or when suffering
from a sore throat or cold.
!
Caution Many physical attributes change depending on various conditions.
Did u know? Biometric systems are typically used in conjunction with other authentication
means in environments requiring high security.
Self Assessment
Fill in the blanks:
6. ....................... devices authenticate users to access control systems through some sort of
personal identifier such as a fingerprint, voiceprint, iris scan, retina scan, facial scan, or
signature dynamics.
7. Biometric authentication systems employ unique physical characteristics (or attributes) of
an individual person in order to authenticate the person’s ....................... .
8. ....................... attributes employed in biometric authentication systems include fingerprints,
hand geometry, hand -written signatures, retina patterns and voice patterns.
9. The ....................... profile is usually based on the combination of several measurements.
10. ....................... in biometric authentication devices arise from technical difficulties in
measuring and profiling physical attributes as well as from the somewhat variable nature
of physical attributes.
13.3 Smart Card Applications
A smart card is a device typically the size and shape of a credit card and contains one or more
integrated chips that perform the functions of a computer with a microprocessor, memory, and
input/output. Smart cards may be used to provide increased functionality as well as an increased
level of security over memory cards when used for identification and authentication.
Smart Cards are plastic cards that have integrated circuits or storage receptacles embedded in
them. Smart cards with integrated circuits that can execute transactions and are often referred to
as “active” smart cards.
Cards with memory receptacles that simply store information (such as your bank ATM card) are
referred to as “passive.” Whether or not a memory card is a type of smart card depends on who
LOVELY PROFESSIONAL UNIVERSITY 191