Page 88 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 88
Information Security and Privacy
Notes 6.6 Summary
Biometric devices authenticate users to access control systems through some sort of personal
identifier such as a fingerprint, voiceprint, iris scan, retina scan, facial scan, or signature
dynamics.
Originally, access control usually refereed to restricting physical access to a facility, building
or room to authorized persons.
Access control is the process by which users are identified and granted certain privileges
to information, systems, or resources.
The primary objective of access control is to preserve and protect the confidentiality,
integrity, and availability of information, systems, and resources.
Authentication is any process by which you verify that someone is who they claim they
are. This usually involves a username and a password, but can include any other method
of demonstrating identity, such as a smart card, retina scan, voice recognition, or
fingerprints.
Face recognition technology functions by analyzing particular traits in the face such as —
the distance between the eyes, width of the nose, position of cheekbones, jaw line, chin,
unique shape, pattern, etc.
Voice biometrics, accesses the person’s voice to verify or recognize the person. It confirms
as well as identifies the speaker.
Signature verification technology is the examination of an individual’s written signature,
involving the speed, acceleration rate, stroke length and pressure applied during the
signature.
When using biometrics verification systems, it is significant that they function in an
accurate fashion.
6.7 Keywords
Access Control: It is the process by which users are identified and granted certain privileges to
information, systems, or resources.
Access Control Device: It properly identifies people, and verifies their identity through an
authentication process so they can be held accountable for their actions.
Authentication: It is a process by which you verify that someone is who they claim they are.
Authorization: It is finding out if the person, once identified, is permitted to have the resource.
Smart Card: It is a device typically the size and shape of a credit card and contains one or more
integrated chips that perform the functions of a computer with a microprocessor, memory, and
input/output.
6.8 Review Questions
1. What is access control? What are the implementation challenges?
2. Discuss the objectives of access control.
3. Explain the concept of User Identification and Authentication.
82 LOVELY PROFESSIONAL UNIVERSITY