Ict Security Measures

  • 28,142 views
Uploaded on

 

More in: Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
28,142
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
498
Comments
8
Likes
7

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Security Measures (Biometrics, Authetications) Contents:
    • Authentication
    • Methods of Authentication
    • Biometric Devices
    910913-02-5011 IC. No Ahmad Syamil B. Hassan Name
  • 2. Authentication
    • Is the process where users verifies that they are who they say they are.
    • The user who attempts to perform functions in a system is in fact the user who is authorised to do so.
  • 3. Authentication Access Denied Access Granted Verification - Verify the validity of the ID Identification Not valid Not valid Valid Valid Valid Identification - Present what the user has. Authentication - Authenticate who the user is.
  • 4. Methods of Authentications
    • There are two commonly used authentication methods. They are biometric devices and callback system
    Biometric Devices
    • It is a device that translates personal characteristic into a digital code that is compared with a digital code stored in the database
    • Examples of biometric device is fingerprint recognition, facial recognition, hand geometry, iris scanning, retinal scanning, voice recognition and signature verification system.
  • 5.
    • Fingerprint Recognition
    • It also measure blood flow, or check for correctly arrayed ridges at the edges of the fingers
    • Facial Recognition
    • Analyses the characteristics of an individual’s face images captured through a digital video camera.
    • Hand Geometry Scanning
    • Involves the measurement and analysis of the shape of one’s hand.
    • Iris Scanning
    • Analyses the features that exists in the coloured tissues surrounding the pupil which has more than 200 points that can be used for comparison including rings and freckles.
    • The scans use a regular video camera and can be done from further away than a retinal scan.
  • 6.
    • Retinal Scanning
    • Involves the scanning of retina and analysing the layer of blood vessels at the back of the eye
    • Involves using the low intensity of light source and optical coupler and can read the patterns at a great level of accuracy.
    • The accuracy is very good and the cost is fair.
    • Requires the user to remove glasses and place their eye close to the device.
    • Voice Recognition
    • Compares a person’s live speech with their stored voice patterns.
    • Requires user to speak into a microphone.
    • What he speaks can be his password or access phrase.
    • Verification time is approximately 5 seconds. To prevent recorded voice use, most recognition devices require the high and low frequencies of the sound to match.
  • 7.
    • Signature Verification System
    • Recognises the shape of your hand written signature as well as measuring the pressure exerted and the motion used to write the signature.
    • Uses special pen and a special tablet.
    • After pre-processing the signature, several features extracted.
    • The authenticity of a writer is determined by comparing an input signature to a stored reference set consisting of three signatures.
    • The accuracy is fair and the cost involved is excellent
  • 8. Conclusion
    • Authentication is very important to prevent unauthorised access of a person’s data.
    • References
    • ICT Form 4 Note book
  • 9. SULTAN ABDUL HAMID COLLEGE The End presented by: Ahmad Syamil Bin Hassan