You are on page 1of 10

SECURITY MEASUREMENT (Biometric devices and authentication) Name : Nur Salsabilla Binti Mohd Syahril Amri Teachers Name:

Puan Rudiana Group Members: Shermaine Yvonne Ng Marini said Nur Salsabilla

CONTENT
 Definition Of Security Measure  Authentication  Biometric Devices  Conclusion  References

AUTHENTICATION
 Authentication is a process where users verify that they are who they say they are.  The user who attempts to perform functions in a system is in fact the user who is authorised to do so.

Identification -present what the user has

Verification -Verify the validity of the ID VALID

NOT VALID
ACCESS DENIED

Identification

VALID NOT VALID

Authentication -Authenticate who the user is ACCESS GRANTED VALID

METHODS OF AUTHENTICATION
1. Biometric device Device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. 2. Callback system The checking system that authenticates the user.

BIOMETRIC DEVICES

FINGERPRINT RECOGNITION Besides checking the fingerprint, it also measures blood flow to avoid a fake finger from being used. FACIAL RECOGNITION It analyses the characteristics of an individual's face images captured through a digital video camera. HAND GEOMETRY SCANNING It involves the measurement and analysis of the shape of a persons hand.

RETINAL SCANNING It involves the scanning of retina and analysing the layer of blood vessels at the back of the eye. VOICE RECOGNITION It compares a persons live speech with the stored voice pattern in the database. SIGNATURE VERIFICATION SYSTEM The authenticity of a writer is determined by comparing an input signature to a stored reference set (template) consisting of three signatures. IRIS SCANNING It analyses the features that exist in the coloured tissues surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles. The scans use a regular video camera and work perfectly fine through glasses and has the ability to create an accurate enough measurement.
7

CALLBACK SYSTEM
o The callback system is commonly used in the bank operation and business transaction. o For example, when you called a McDonald Delivery Services, the operator wil ask you to hang up since he wants to link you with the other worker.

CONCLUSION

Authentication is important in order to safeguard against the unauthorised access and use.

REFERENCES
ICT Note Form 4 http://slideshare.net/ict-security-measures81805

10

You might also like