You are on page 1of 19

Unit 5 –Security

LO3. Review mechanisms to control organisational IT


security.
10. Biometrics & Theft Prevention.

1
We can authenticate an identity in three
ways:
▪Something the user knows (such as a password or
personal identification number)
▪Something the user has (a security token or smart card)
▪Something the user is (a physical characteristic, such
as a fingerprint, called a biometric)

2
Biometrics.

▪Biometrics verify an individual’s identity by analysing a


unique personal attribute or behaviour.
▪It is the most effective and accurate method for verifying
identification.

3
Biometrics.
▪Signature dynamics - Based on an individual's
signature, but considered unforgeable because what is
recorded isn't the final image but how it is produced.
▪Example: Differences in pressure and writing speed at
various points in the signature

4
Biometrics.

▪Typing patterns - Similar to signature dynamics but


extended to the keyboard, recognizing not just a
password that is typed in but the intervals between
characters and the overall speeds and pattern.

5
Biometrics.

Eye scans (Retina Scanning and Iris Scanning) –


▪Iris recognition and retina scanning are both very
reliable modalities for biometric identification.
▪An iris scan is no different than taking a normal
photograph of a person and can be performed at a
distance.
▪Retina scanning the eye must be brought very close to
an eyepiece (like looking into a microscope).

6
Biometrics.

▪ Facial recognition - Facial recognition is a way of


recognizing a human face through technology.
▪ A facial recognition system uses biometrics to map facial
features from a photograph or video.
▪ It compares the information with a database of known faces
to find a match.
▪ Facial recognition can help verify personal identity. Most
technologies avoid areas of the face near the hairline so
that hairstyle changes won't affect recognition.

7
Who uses facial recognition?
▪ U.S. government at airports. Facial recognition systems can
monitor people coming and going in airports.
▪ Mobile phone makers in products. Apple first used facial
recognition to unlock its iPhone X, and continues with the
iPhone XS. Face ID authenticates — it makes sure you’re you
when you access your phone. Apple says the chance of a
random face unlocking your phone is about one in 1 million.

8
Who uses facial recognition?

▪Social media companies on websites. Facebook


uses an algorithm to spot faces when you upload a
photo to its platform. The social media company asks if
you want to tag people in your photos. If you say yes, it
creates a link to their profiles. Facebook can recognize
faces with 98 percent accuracy.
▪Businesses at entrances and restricted areas. Some
companies have traded in security badges for facial
recognition systems.

9
Biometrics.
▪ Fingerprint recognition - Everyone knows fingerprints
are unique. They are also readily accessible and require
little physical space either for the reading hardware or
the stored data.
▪ Most fingerprint scanners do not digitise the entire
fingerprint.

10
Biometrics.

▪Hand or palm geometry - We are used to fingerprints


but seldom think of an entire hand as an individual
identifier. This method relies on devices that measure
the length and angles of individual fingers.

11
Biometrics.

▪Voice recognition - This is different from speech


recognition.
▪The idea is to verify the individual speaker against a
stored voice pattern, not to understand what is being
said. Measurement points include volume, speed /
tempo, subtle differences in pronunciation etc.

12
Biometrics - The Current Leader.
▪Because of its convenience and ease of use, fingerprint
authentication is becoming the biometric technology of
widest choice.
▪A growing number of notebook PCs and computer
peripherals are coming to market with built-in fingerprint
readers.

13
Biometrics - The Current Leader.

▪Today, devices allow the user to maintain encrypted


passwords that don't need to be remembered but
instead are invoked after the user puts his finger on the
reader. This can also be used with a separate PIN or
password to offer true two-factor authentication.

14
Biometric authentication.

▪Biometric authentication is a security process that relies


on the unique biological characteristics of an individual
to verify that who is he . Biometric authentication
systems compare a biometric data capture to stored,
confirmed authentic data in a database. If both samples
of the biometric data match, authentication is confirmed.

15
Theft Prevention.

There are a number of techniques that you can use to


protect your devices to prevent theft, or to help in
recovery.
▪Keep track of important data.
▪Engrave contact and reward information.
▪Don't keep equipment out in the open.
▪Use a physical lock.

16
Theft Prevention.

Keep track of important data.


▪ Write down the computer serial number and model number,
the support phone number, and any other useful details
about the computer and store that information in your files.
▪ Keep the receipts of your computer and associated
equipment.
▪ This information will come in handy when you need to
report the laptop or other device as stolen.

17
Theft Prevention.

Don't keep equipment out in the open


▪Never keep your laptop or other devices out in the open,
this is especially true when a laptop is in your car. If you
leave your laptop alone even for a moment it's an easy
target for someone to grab while you're not looking.

18
Lesson Summary

▪Biometrics
▪Biometric authentication
▪Theft Prevention

19

You might also like