Page 89 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 89
Unit 6: Biometric Controls for Security
4. What are the basic authentication means by which an individual may authenticate his Notes
identity?
5. What are the various biometrics techniques used for identification? Discuss.
6. Make distinction between face recognition and eye recognition.
7. Explain the factors based on the performance of the biometrics system.
8. Compare and contrast between memory card and smart card.
9. Explicate the concept of biometric authentication systems.
10. Differentiate between the RB-RBAC and RBAC.
Answers: Self Assessment
1. Access control 2. Integrity
3. Confidentiality 4. Authorization
5. Identification 6. Authentication
7. Biometric 8. Face recognition
9. Hand geometry 10. Voice
11. Signature verification 12. Keystroke
13. False rejection rate (FRR) 14. Data-processing
15. Reliability
6.9 Further Readings
Books An Introduction to Computer Security: The NIST Handbook
Managing Enterprise Information Integrity: Security, Control and Audit Issues, By IT
Governance Institute
Principles of Information Security by Michael E. Whitman and Herbert Mattord;
Risk Management Guide for Information Technology Systems
Risks of Customer Relationship Management: A Security, Control, and Audit Approach
by PricewaterHouseCoopers Llp
Security, Audit & Control Features PeopleSoft: A Technical and Risk Management
Reference Guide; 2nd Edition, by Deloitte Touche Tohmatsu Research Team; ISACA
Online link idwarehouse.com.au/
LOVELY PROFESSIONAL UNIVERSITY 83