Page 88 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 88

Information  Security and Privacy




                    Notes          6.6 Summary

                                      Biometric devices authenticate users to access control systems through some sort of personal
                                       identifier such as a fingerprint, voiceprint, iris scan, retina scan, facial scan, or signature
                                       dynamics.
                                      Originally, access control usually refereed to restricting physical access to a facility, building
                                       or room to authorized persons.
                                      Access control is the process by which users are identified and granted certain privileges
                                       to information, systems, or resources.
                                      The primary  objective of  access control is to preserve and protect the confidentiality,
                                       integrity, and availability of information, systems, and resources.

                                      Authentication is any process by which you verify that someone is who they claim they
                                       are. This usually involves a username and a password, but can include any other method
                                       of  demonstrating  identity, such  as  a  smart  card,  retina  scan,  voice  recognition,  or
                                       fingerprints.
                                      Face recognition technology functions by analyzing particular traits in the face such as —
                                       the distance between the eyes, width of the nose, position of cheekbones, jaw line, chin,
                                       unique shape, pattern, etc.

                                      Voice biometrics, accesses the person’s voice to verify or recognize the person. It confirms
                                       as well as identifies the speaker.
                                      Signature verification technology is the examination of an individual’s written signature,
                                       involving  the speed,  acceleration rate,  stroke length  and pressure  applied during the
                                       signature.

                                      When  using biometrics  verification  systems, it  is significant  that they function  in  an
                                       accurate fashion.

                                   6.7 Keywords

                                   Access Control: It is the process by which users are identified and granted certain privileges to
                                   information, systems, or resources.
                                   Access  Control Device:  It properly  identifies people, and  verifies their  identity through  an
                                   authentication process so they can be held accountable for their actions.
                                   Authentication: It is a process by which you verify that someone is who they claim they are.
                                   Authorization: It is finding out if the person, once identified, is permitted to have the resource.
                                   Smart Card: It is a device typically the size and shape of a credit card and contains one or more
                                   integrated chips that perform the functions of a computer with a microprocessor, memory, and
                                   input/output.

                                   6.8 Review Questions


                                   1.  What is access control? What are the implementation challenges?
                                   2.  Discuss the objectives of access control.
                                   3.  Explain the concept of User Identification and Authentication.






          82                                LOVELY PROFESSIONAL UNIVERSITY
   83   84   85   86   87   88   89   90   91   92   93