Page 197 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 197

Unit 13: Privacy Technological Impacts




          2.   When  attempting  to  authenticate  themselves,  the  user  enters  his  login  name  or,  Notes
               alternatively, the user may provide a card/token containing identification information.
               The user’s physical attribute is then measured.
          3.   The previously stored reference profile of the physical attribute is then compared with the
               measured profile of the attribute taken from the user. The result of the comparison is then
               used to either accept or reject the user.
          4.   Biometric systems can provide an  increased level  of security  for IT  systems, but  the
               technology is still less matures than memory or smart cards. Imperfections in biometric
               authentication devices arise from technical difficulties in measuring and profiling physical
               attributes as well as from the somewhat variable nature of physical attributes.


                Example: A person’s speech pattern may change under stressful conditions or when suffering
          from a sore throat or cold.

               !
             Caution Many physical attributes change depending on various conditions.



             Did u know? Biometric systems are typically used in conjunction with other authentication
             means in environments requiring high security.

          Self Assessment

          Fill in the blanks:

          6.   ....................... devices authenticate users to access control systems through some sort of
               personal identifier such as a fingerprint, voiceprint, iris scan, retina scan, facial scan, or
               signature dynamics.

          7.   Biometric authentication systems employ unique physical characteristics (or attributes) of
               an individual person in order to authenticate the person’s ....................... .
          8.   ....................... attributes employed in biometric authentication systems include fingerprints,
               hand geometry, hand -written signatures, retina patterns and voice patterns.
          9.   The ....................... profile is usually based on the combination of several measurements.
          10.  ....................... in biometric  authentication devices arise from  technical difficulties  in
               measuring and profiling physical attributes as well as from the somewhat variable nature
               of physical attributes.

          13.3 Smart Card Applications

          A smart card is a device typically the size and shape of a credit card and contains one or more
          integrated chips that perform the functions of a computer with a microprocessor, memory, and
          input/output. Smart cards may be used to provide increased functionality as well as an increased
          level of security over memory cards when used for identification and authentication.
          Smart Cards are plastic cards that have integrated circuits or storage receptacles embedded in
          them. Smart cards with integrated circuits that can execute transactions and are often referred to
          as “active” smart cards.
          Cards with memory receptacles that simply store information (such as your bank ATM card) are
          referred to as “passive.” Whether or not a memory card is a type of smart card depends on who



                                           LOVELY PROFESSIONAL UNIVERSITY                                   191
   192   193   194   195   196   197   198   199   200   201   202