Professional Documents
Culture Documents
Security Measurement
Security Measurement
Puan Rudiana Group Members: Shermaine Yvonne Ng Marini said Nur Salsabilla
CONTENT
Definition Of Security Measure Authentication Biometric Devices Conclusion References
AUTHENTICATION
Authentication is a process where users verify that they are who they say they are. The user who attempts to perform functions in a system is in fact the user who is authorised to do so.
NOT VALID
ACCESS DENIED
Identification
METHODS OF AUTHENTICATION
1. Biometric device Device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. 2. Callback system The checking system that authenticates the user.
BIOMETRIC DEVICES
FINGERPRINT RECOGNITION Besides checking the fingerprint, it also measures blood flow to avoid a fake finger from being used. FACIAL RECOGNITION It analyses the characteristics of an individual's face images captured through a digital video camera. HAND GEOMETRY SCANNING It involves the measurement and analysis of the shape of a persons hand.
RETINAL SCANNING It involves the scanning of retina and analysing the layer of blood vessels at the back of the eye. VOICE RECOGNITION It compares a persons live speech with the stored voice pattern in the database. SIGNATURE VERIFICATION SYSTEM The authenticity of a writer is determined by comparing an input signature to a stored reference set (template) consisting of three signatures. IRIS SCANNING It analyses the features that exist in the coloured tissues surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles. The scans use a regular video camera and work perfectly fine through glasses and has the ability to create an accurate enough measurement.
7
CALLBACK SYSTEM
o The callback system is commonly used in the bank operation and business transaction. o For example, when you called a McDonald Delivery Services, the operator wil ask you to hang up since he wants to link you with the other worker.
CONCLUSION
Authentication is important in order to safeguard against the unauthorised access and use.
REFERENCES
ICT Note Form 4 http://slideshare.net/ict-security-measures81805
10