Tuesday, 18 February 2020

Biometric Controls for Security

0 comments

Biometric Controls for Security


? Biometric devices authenticate users to access control systems through some sort of personal
identifier such as a fingerprint, voiceprint, iris scan, retina scan, facial scan, or signature
dynamics.
? Originally, access control usually refereed to restricting physical access to a facility, building
or room to authorized persons.
? Access control is the process by which users are identified and granted certain privileges
to information, systems, or resources.
? The primary objective of access control is to preserve and protect the confidentiality,
integrity, and availability of information, systems, and resources.
? Authentication is any process by which you verify that someone is who they claim they
are. This usually involves a username and a password, but can include any other method
of demonstrating identity, such as a smart card, retina scan, voice recognition, or
fingerprints.
? Face recognition technology functions by analyzing particular traits in the face such as —
the distance between the eyes, width of the nose, position of cheekbones, jaw line, chin,
unique shape, pattern, etc.
? Voice biometrics, accesses the person’s voice to verify or recognize the person. It confirms
as well as identifies the speaker.
? Signature verification technology is the examination of an individual’s written signature,
involving the speed, acceleration rate, stroke length and pressure applied during the
signature.
? When using biometrics verification systems, it is significant that they function in an
accurate fashion.


Access Control: It is the process by which users are identified and granted certain privileges to
information, systems, or resources.
Access Control Device: It properly identifies people, and verifies their identity through an
authentication process so they can be held accountable for their actions.
Authentication: It is a process by which you verify that someone is who they claim they are.
Authorization: It is finding out if the person, once identified, is permitted to have the resource.
Smart Card: It is a device typically the size and shape of a credit card and contains one or more
integrated chips that perform the functions of a computer with a microprocessor, memory, and
input/output.

No comments:

Post a Comment