SlideShare a Scribd company logo
1 of 22
IDENTIFICATION &
AUTHENTICATION
IDENTIFICATION
• An assertion of who we are
• examples :
• Who we claim to be as a person
• Who a system claims to be over a network
• Who the originating party of an email claims
METHODS OF IDENTIFICATION
• Full names
• Account numbers
• IDs
• Usernames
• Fingerprints
• DNA samples
• etc
IDENTIFICATION
Who we claim who we are, in many
cases, be an information is subject
to change.
Thus, an unsubstantiated claim of
identity is not reliable information on
its own.
IDENTITY VERIFICATION
• establish a mapping from a person’s/system’s identity to
their real life identity
• Example :
• Show of IDs or other form of identification
FALSIFYING IDENTIFICATION
• Methods of identification are subject to change. As such,
they are also subject to falsification.
• Identity theft is a major concern today occurring due to
lack of authentication requirements for many activities in
which we engage.
AUTHENTICATION
• Set of methods use to establish a claim of identity as
being true.
• FACTORS
• Something you know
• Something you are
• Something you have
• Something you do
• Where you are
SOMETHING YOU KNOW
• Any information that a person can remember to claim to
authenticate who he/she is
• Examples :
• Passwords, PINs, passphrases
• Weak factor since when exposed, this can nullify the
uniqueness of our authentication method
SOMETHING YOU ARE
• Based on relatively unique physical attributes of an
individual often referred to as BIOMETRICS
• Examples :
• Height, weight, color, fingerprints, retina,
SOMETHING YOU HAVE
• Based on possession of an item or device also extending
into some logical concepts
• Examples :
• ATMs, SSS Card, software based security token
SOMETHING YOU DO
• Variation of something you are based on actions or
behaviors of an individual
• Examples :
• Handwriting, delay between keystrokes as he types a passphrase
WHERE YOU ARE
• Geographically based authentication factor
MULTIFACTOR AUTHENTICATION
• The use of two or more factors in determining the identify
of a person as true.
• Example :
• ATM for something you have while PIN for something you know
MUTUAL AUTHENTICATION
• Refers to an authentication mechanism in which both
parties authenticate each other.
• Problems without mutual authentication :
IMPERSONATION ATTACK where an attacker inserts
himself between the client and the server impersonating
the client to the server and the server to the client
• Can be used in combination with multifactor
authentication
PASSWORDS
• One example of a single factor authentication
• Passwords must be strong/complex to prevent BRUTE
FORCE CRACKING trying every possible combination of
characters that the password can be composed of until
we tried it all.
• Practice good password hygiene. Passwords should not
be just anywhere for people to snoop around.
• Passwords should not be similar to other user accounts
you have to avoid MANUAL SYNCHRONIZATION OF
PASSWORD
BIOMETRICS
• refers to or metrics related to human characteristics and
traits is used in computer science as a form of
identification and access control
• BIOMETRIC IDENTIFIERS are the distinctive,
measurable characteristics used to label and describe
individuals
CATEGORIES OF BIOMETRICS
• PHYSIOLOGICAL
• Anything related to the shape of the body.
• Examples:
• fingerprint, palm veins, face recognition, DNA, palm print, hand
geometry, iris recognition, retina and odor/scent.
• BEHAVIORAL
• related to the pattern of behavior of a person,
• Examples : typing rhythm, voice
FACTORS ASSESSING SUITABILITY OF A
BIOMETRICS FOR AUTHENTICATION
• Universality
• Uniqueness
• Permanence
• Collectability
• Performance
• Acceptability
• Circumvention
FACTORS ASSESSING SUITABILITY OF A
BIOMETRICS FOR AUTHENTICATION
• UNIVERSALITY
• Find a biometric characteristics in the majority of the people we
expect to enroll in the system.
• ENROLLMENT – recording a biometric characteristic from the
user.
• UNIQUENESS
• Measure of how unique a particular characteristic is among
individuals.
FACTORS ASSESSING SUITABILITY OF A
BIOMETRICS FOR AUTHENTICATION
• PERMANENCE
• Biometric characteristic tested how well it would resists change
over time and with advancing age.
• COLLECTABILITY
• How easy to acquire a characteristic which we can later
authenticate the user.
• PERFORMANCE
• Set of metrics of how well a given system functions
• Factors to consider : speed, accuracy and error rate
MEASURING PERFORMANCE OF A
BIOMETRIC SYSTEM
• FALSE ACCEPTANCE RATE
• Occurs when we accept a user whom we should actually have
rejected also referred as FALSE POSITIVE
• FALSE REJECTION RATE
• Problem of rejecting a legitimate user when we should have
accepted referred to as FALSE NEGATIVE.
• EQUAL ERROR RATE
• Balance between the two error types. It is the intersection of False
Acceptance Rate and False Rejection Rate.
• Used as a measure of the accuracy of biometric system
ISSUES ON BIOMETRIC SYSTEM
• Some might be falsified
• Privacy in the use of biometrics

More Related Content

Similar to Date security identifcation and authentication

Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication TechnologiesNicholas Davis
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologiesNicholas Davis
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Hai Nguyen
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Ali Raw
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 
Electronic Authentication More Than Just A Password
Electronic Authentication More Than Just A PasswordElectronic Authentication More Than Just A Password
Electronic Authentication More Than Just A PasswordNicholas Davis
 
Electronic authentication more than just a password
Electronic authentication more than just a passwordElectronic authentication more than just a password
Electronic authentication more than just a passwordNicholas Davis
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology NEHA SINGH
 
Electronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a PasswordElectronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a PasswordNicholas Davis
 
Trust elevation-abbie-v1
Trust elevation-abbie-v1Trust elevation-abbie-v1
Trust elevation-abbie-v1Abbie Barbir
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Nicholas Davis
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Nicholas Davis
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxRahulSagar79
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityGlobalSign
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4skimil
 
Identity 3.0 and Oracle
Identity 3.0 and OracleIdentity 3.0 and Oracle
Identity 3.0 and OracleBram van Pelt
 

Similar to Date security identifcation and authentication (20)

Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Electronic Authentication More Than Just A Password
Electronic Authentication More Than Just A PasswordElectronic Authentication More Than Just A Password
Electronic Authentication More Than Just A Password
 
Electronic authentication more than just a password
Electronic authentication more than just a passwordElectronic authentication more than just a password
Electronic authentication more than just a password
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
 
Electronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a PasswordElectronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a Password
 
Trust elevation-abbie-v1
Trust elevation-abbie-v1Trust elevation-abbie-v1
Trust elevation-abbie-v1
 
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
Pki & Personal Digital Certificates, Securing Sensitive Electronic Commun...
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...Pki & personal digital certificates, securing sensitive electronic communicat...
Pki & personal digital certificates, securing sensitive electronic communicat...
 
INTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptxINTRODUCTION TO BIOMETRIC.pptx
INTRODUCTION TO BIOMETRIC.pptx
 
Security audit
Security auditSecurity audit
Security audit
 
Security Audit
Security AuditSecurity Audit
Security Audit
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
Authentication and session v4
Authentication and session v4Authentication and session v4
Authentication and session v4
 
Identity 3.0 and Oracle
Identity 3.0 and OracleIdentity 3.0 and Oracle
Identity 3.0 and Oracle
 
Identity 3.0 and Oracle at AMIS25
Identity 3.0 and Oracle at AMIS25Identity 3.0 and Oracle at AMIS25
Identity 3.0 and Oracle at AMIS25
 

More from Leo Mark Villar

Date security security principles
Date security   security principlesDate security   security principles
Date security security principlesLeo Mark Villar
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access controlLeo Mark Villar
 
Date security introduction
Date security   introductionDate security   introduction
Date security introductionLeo Mark Villar
 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountabilityLeo Mark Villar
 
Computer fundamentals-internet p2
Computer fundamentals-internet p2Computer fundamentals-internet p2
Computer fundamentals-internet p2Leo Mark Villar
 
Computer fundamentals-internet p1
Computer fundamentals-internet p1Computer fundamentals-internet p1
Computer fundamentals-internet p1Leo Mark Villar
 

More from Leo Mark Villar (12)

Date security security principles
Date security   security principlesDate security   security principles
Date security security principles
 
Data security authorization and access control
Data security  authorization and access controlData security  authorization and access control
Data security authorization and access control
 
Date security introduction
Date security   introductionDate security   introduction
Date security introduction
 
Data security auditing and accountability
Data security   auditing and accountabilityData security   auditing and accountability
Data security auditing and accountability
 
Web programming
Web programmingWeb programming
Web programming
 
Computer fundamentals-internet p2
Computer fundamentals-internet p2Computer fundamentals-internet p2
Computer fundamentals-internet p2
 
Computer fundamentals-internet p1
Computer fundamentals-internet p1Computer fundamentals-internet p1
Computer fundamentals-internet p1
 
Html
HtmlHtml
Html
 
Team foundation server
Team foundation serverTeam foundation server
Team foundation server
 
Microsoft office 2013
Microsoft office 2013Microsoft office 2013
Microsoft office 2013
 
Sql performance tuning
Sql performance tuningSql performance tuning
Sql performance tuning
 
Angular js
Angular jsAngular js
Angular js
 

Recently uploaded

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Date security identifcation and authentication

  • 2. IDENTIFICATION • An assertion of who we are • examples : • Who we claim to be as a person • Who a system claims to be over a network • Who the originating party of an email claims
  • 3. METHODS OF IDENTIFICATION • Full names • Account numbers • IDs • Usernames • Fingerprints • DNA samples • etc
  • 4. IDENTIFICATION Who we claim who we are, in many cases, be an information is subject to change. Thus, an unsubstantiated claim of identity is not reliable information on its own.
  • 5. IDENTITY VERIFICATION • establish a mapping from a person’s/system’s identity to their real life identity • Example : • Show of IDs or other form of identification
  • 6. FALSIFYING IDENTIFICATION • Methods of identification are subject to change. As such, they are also subject to falsification. • Identity theft is a major concern today occurring due to lack of authentication requirements for many activities in which we engage.
  • 7. AUTHENTICATION • Set of methods use to establish a claim of identity as being true. • FACTORS • Something you know • Something you are • Something you have • Something you do • Where you are
  • 8. SOMETHING YOU KNOW • Any information that a person can remember to claim to authenticate who he/she is • Examples : • Passwords, PINs, passphrases • Weak factor since when exposed, this can nullify the uniqueness of our authentication method
  • 9. SOMETHING YOU ARE • Based on relatively unique physical attributes of an individual often referred to as BIOMETRICS • Examples : • Height, weight, color, fingerprints, retina,
  • 10. SOMETHING YOU HAVE • Based on possession of an item or device also extending into some logical concepts • Examples : • ATMs, SSS Card, software based security token
  • 11. SOMETHING YOU DO • Variation of something you are based on actions or behaviors of an individual • Examples : • Handwriting, delay between keystrokes as he types a passphrase
  • 12. WHERE YOU ARE • Geographically based authentication factor
  • 13. MULTIFACTOR AUTHENTICATION • The use of two or more factors in determining the identify of a person as true. • Example : • ATM for something you have while PIN for something you know
  • 14. MUTUAL AUTHENTICATION • Refers to an authentication mechanism in which both parties authenticate each other. • Problems without mutual authentication : IMPERSONATION ATTACK where an attacker inserts himself between the client and the server impersonating the client to the server and the server to the client • Can be used in combination with multifactor authentication
  • 15. PASSWORDS • One example of a single factor authentication • Passwords must be strong/complex to prevent BRUTE FORCE CRACKING trying every possible combination of characters that the password can be composed of until we tried it all. • Practice good password hygiene. Passwords should not be just anywhere for people to snoop around. • Passwords should not be similar to other user accounts you have to avoid MANUAL SYNCHRONIZATION OF PASSWORD
  • 16. BIOMETRICS • refers to or metrics related to human characteristics and traits is used in computer science as a form of identification and access control • BIOMETRIC IDENTIFIERS are the distinctive, measurable characteristics used to label and describe individuals
  • 17. CATEGORIES OF BIOMETRICS • PHYSIOLOGICAL • Anything related to the shape of the body. • Examples: • fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odor/scent. • BEHAVIORAL • related to the pattern of behavior of a person, • Examples : typing rhythm, voice
  • 18. FACTORS ASSESSING SUITABILITY OF A BIOMETRICS FOR AUTHENTICATION • Universality • Uniqueness • Permanence • Collectability • Performance • Acceptability • Circumvention
  • 19. FACTORS ASSESSING SUITABILITY OF A BIOMETRICS FOR AUTHENTICATION • UNIVERSALITY • Find a biometric characteristics in the majority of the people we expect to enroll in the system. • ENROLLMENT – recording a biometric characteristic from the user. • UNIQUENESS • Measure of how unique a particular characteristic is among individuals.
  • 20. FACTORS ASSESSING SUITABILITY OF A BIOMETRICS FOR AUTHENTICATION • PERMANENCE • Biometric characteristic tested how well it would resists change over time and with advancing age. • COLLECTABILITY • How easy to acquire a characteristic which we can later authenticate the user. • PERFORMANCE • Set of metrics of how well a given system functions • Factors to consider : speed, accuracy and error rate
  • 21. MEASURING PERFORMANCE OF A BIOMETRIC SYSTEM • FALSE ACCEPTANCE RATE • Occurs when we accept a user whom we should actually have rejected also referred as FALSE POSITIVE • FALSE REJECTION RATE • Problem of rejecting a legitimate user when we should have accepted referred to as FALSE NEGATIVE. • EQUAL ERROR RATE • Balance between the two error types. It is the intersection of False Acceptance Rate and False Rejection Rate. • Used as a measure of the accuracy of biometric system
  • 22. ISSUES ON BIOMETRIC SYSTEM • Some might be falsified • Privacy in the use of biometrics