Published on

security measures is a techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Some example of security measures are biometrics and authentication.

Published in: Technology, Business
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide


  1. 1. SECURITY MEASURES By: Nabihah Bt Zakaria Form: 4 Asma
  2. 2. Table of content <ul><li>Description of security measures </li></ul><ul><li>Example of use security measures </li></ul><ul><li>Importance to know about security measures </li></ul><ul><li>Suggestion to use security measures </li></ul><ul><li>Source of Reference </li></ul>
  3. 3. Description of security measures <ul><li>In the computer industry, security measures refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Some example of security measures are biometrics and authentication. </li></ul>
  4. 4. Example of use security measures <ul><li>Biometric </li></ul><ul><li>In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. A biometric identifier is a physiological (related to physical or chemical activities in the body) or behavioral characteristic. </li></ul><ul><li>Authentication </li></ul><ul><li>Authentication is the process of attempting to verify the digital identity of the sender of a communication such as a request to log in. The sender being authenticated may be a person using a computer, a computer itself or a computer program.Three methods of authentication include user names and passwords, possessed objects, and biometric devices. </li></ul>
  5. 5. Importance to know about security measures <ul><li>Biometrics </li></ul><ul><li>A biometric system can provide the following three functions: </li></ul><ul><li>Verification is he the person he claims to be? Somebody claims to be a person whose biometric info are already known (e.g. they were stored on a card or in a database). We want to extract new biometric info from the person and check if those are matching with the ones we have. This way we can verify the identity of a person. In other words, it's a 1:1 match verification. </li></ul><ul><li>Identification who is he? we extract biometric info from a person and we compare them with our database. It is a much more difficult task than verification because we have to compare those info with all the other entries of the database and the result must provide one clear answer. The info we use have to give us the ability to discriminate between so many other people. It is a 1:N match verification, where N is the usually large number of templates in the database. </li></ul><ul><li>Screening does he belong to the watch-list? We want to check if the person belongs to a group we have chosen. For example, we could use it to allow access to a restricted area only to a limited number of people or to check if a wanted person passes through a certain area. It works like identification, but the number of people in the database is much smaller. In other words, it's a 1:n match verification, where of the previous case. Some authors ignore this definition because &quot;screening&quot; can be seen as a particular case of &quot;identification&quot;. </li></ul>
  6. 6. <ul><li>Authentication </li></ul><ul><li>All authentication schemes are based on the possession of some secret information known only to the user and possibly (but not necessarily) to the authentication system itself. </li></ul><ul><li>Interactions with other parties use this secret in a way that allows the recipient to verify that the user possesses the secret, but that does not divulge the secret itself. </li></ul><ul><li>This means that the secret itself cannot be shared, since to do so would allow the recipient to impersonate the user on subsequent interactions with other parties. </li></ul><ul><li>Authentication system also provide differing levels of functionality. At minimum, they allow a recipient to verify that a message originated with a particular user (or user's agent; e.g., a program). </li></ul><ul><li>More powerful systems ensure that messages cannot be copied and replayed in the future, that a client can prove to a third party that a message originated with a particular user (non-repudiation), and that require multiple users to validate a message (the equivalent to requiring multiple signatures on a checking account). </li></ul>
  7. 7. Suggestion to use security measures <ul><li>There are several types of biometric identification schemes: </li></ul><ul><li>FACE : The analysis of facial characteristics. Captures a live face image and compares it with a stored image to determine if the person is a legitimate user. These programs are becoming more sophisticated and can recognize people with or without glasses, makeup, or jewelry, and with new hairstyles. </li></ul><ul><li>FINGERPRINT : The analysis of an individual’s unique fingerprints. Captures curves and indentations of a fingerprint. Home and small business users install fingerprint scanners to authenticate users before they can access a personal computer. Grade schools also use fingerprints scanners to identify students in the cafeteria and adjust account balances for each lunch purchased. </li></ul><ul><li>HAND GEOMETRY : The analysis of the shape of the hand and the length of the fingers. Larger companies use these systems as time and attendance devices or as security devices. Colleges use these systems to verify students’ identities. Day-care centers and hospital nurseries use them to verify parents who pick up their children. </li></ul><ul><li>RETINA : The analysis of the capillary vessels located at the back of the eye. </li></ul><ul><li>IRIS : The analysis of the colored ring that surrounds the eye’s pupil. High security areas like government security organizations, the military, and financial institutions that deal with highly sensitive data use these systems. </li></ul><ul><li>SIGNATURE : The analysis of the way a person signs his name. Recognizes the shape of your handwritten signature, as well as measures the pressure exerted and the motion use to write the signature. These systems use a specialized pen and tablet. </li></ul><ul><li>VEIN : The analysis of pattern of veins in the back if the hand and the wrist. </li></ul><ul><li>VOICE : The analysis of the tone, pitch, cadence and frequency of a person’s voice. Compares a person's live speech with their stored voice pattern. These systems use speaker-dependent voice recognition software. </li></ul><ul><li>SMART CARD : Stores the personal data on a thin microprocessor embedded in the card. </li></ul>
  8. 8. Iris recognition system Fingerprint scanner Smart card reader Hand geometry system
  9. 9. <ul><li>There are several types of authentication: </li></ul><ul><li>USER NAMES AND PASSWORDS : A user names, or user ID is a unique combination of characters, such as letters of the alphabet or numbers that identifies one specific user. A password is a private combination of characters associated with the user names that allow access to certain computer resources. </li></ul><ul><li>POSSESSED OBJECTS : Any item that you must carry to gain access to a computer or computer facility. Example are badges, cards smart cards, and keys. Possessed objects often are used in combination with personal identification numbers (PIN). PIN is a numeric password, either assigned by a company or selected by a user. </li></ul><ul><li>BIOMETRIC DEVICES : Authenticates a person’s identity by translating a personal characteristic. This system are gaining popularity because they are a virtually foolproof method. </li></ul>
  10. 10. REFERENCE <ul><li>Web Site </li></ul><ul><li>-Http:// www.webopedia.com </li></ul><ul><li>-Http:// www.wikipedia.com </li></ul><ul><li>-Http:// www.search.yahoo.com/search/images;fingerprintscanner </li></ul><ul><li>-Http:// www.search.yahoo.com/search/images;irisrecognitionsystem </li></ul><ul><li>-Http:// www.search.yahoo.com/search/images;smartcardreader </li></ul><ul><li>-Http:// www.search.yahoo.com/search/images;handgeometrysystem </li></ul><ul><li>-Http:// www.objs.com/survey/authent.htm </li></ul><ul><li>Book </li></ul><ul><li>-Discovering Computers 2006 by: Gary B. Shelly </li></ul><ul><li>Thomas J. Cashman </li></ul><ul><li>Misty E. Vermaat </li></ul>