I C T   Security  Measures
Upcoming SlideShare
Loading in...5
×
 

I C T Security Measures

on

  • 5,313 views

 

Statistics

Views

Total Views
5,313
Views on SlideShare
5,307
Embed Views
6

Actions

Likes
1
Downloads
101
Comments
2

1 Embed 6

http://www.slideshare.net 6

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

12 of 2

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • good
    Are you sure you want to
    Your message goes here
    Processing…
  • gooo
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    I C T   Security  Measures I C T Security Measures Presentation Transcript

    • Security Measures (Biometrics, Authetications) Contents:
      • Authentication
      • Methods of Authentication
      • Biometric Devices
      910913-02-5011 IC. No Ahmad Syamil B. Hassan Name
    • Authentication
      • Is the process where users verifies that they are who they say they are.
      • The user who attempts to perform functions in a system is in fact the user who is authorised to do so.
    • Authentication Access Denied Access Granted Verification - Verify the validity of the ID Identification Not valid Not valid Valid Valid Valid Identification - Present what the user has. Authentication - Authenticate who the user is.
    • Methods of Authentications
      • There are two commonly used authentication methods. They are biometric devices and callback system
      Biometric Devices
      • It is a device that translates personal characteristic into a digital code that is compared with a digital code stored in the database
      • Examples of biometric device is fingerprint recognition, facial recognition, hand geometry, iris scanning, retinal scanning, voice recognition and signature verification system.
      • Fingerprint Recognition
      • It also measure blood flow, or check for correctly arrayed ridges at the edges of the fingers
      • Facial Recognition
      • Analyses the characteristics of an individual’s face images captured through a digital video camera.
      • Hand Geometry Scanning
      • Involves the measurement and analysis of the shape of one’s hand.
      • Iris Scanning
      • Analyses the features that exists in the coloured tissues surrounding the pupil which has more than 200 points that can be used for comparison including rings and freckles.
      • The scans use a regular video camera and can be done from further away than a retinal scan.
      • Retinal Scanning
      • Involves the scanning of retina and analysing the layer of blood vessels at the back of the eye
      • Involves using the low intensity of light source and optical coupler and can read the patterns at a great level of accuracy.
      • The accuracy is very good and the cost is fair.
      • Requires the user to remove glasses and place their eye close to the device.
      • Voice Recognition
      • Compares a person’s live speech with their stored voice patterns.
      • Requires user to speak into a microphone.
      • What he speaks can be his password or access phrase.
      • Verification time is approximately 5 seconds. To prevent recorded voice use, most recognition devices require the high and low frequencies of the sound to match.
      • Signature Verification System
      • Recognises the shape of your hand written signature as well as measuring the pressure exerted and the motion used to write the signature.
      • Uses special pen and a special tablet.
      • After pre-processing the signature, several features extracted.
      • The authenticity of a writer is determined by comparing an input signature to a stored reference set consisting of three signatures.
      • The accuracy is fair and the cost involved is excellent
    • Conclusion
      • Authentication is very important to prevent unauthorised access of a person’s data.
      • References
      • ICT Form 4 Note book
    • The End presented by: Ahmad Syamil Bin Hassan
    •