Ict Security Measures

17,027 views

Published on

Published in: Education, Technology
1 Comment
5 Likes
Statistics
Notes
No Downloads
Views
Total views
17,027
On SlideShare
0
From Embeds
0
Number of Embeds
16
Actions
Shares
0
Downloads
204
Comments
1
Likes
5
Embeds 0
No embeds

No notes for slide

Ict Security Measures

  1. 1. SECURITY MEASURES [BIOMETRIC DEVICES,AUTHENTICATION] NAME : SYAHIRA BINTI SEPEAI CLASS : 4 ACCOUNT 1 CONTENT : Authentication, Methods of Authentication Biometric Devices
  2. 2. AUTHENTICATION <ul><li>Authentication is a process where users verify that they are who they say they are. </li></ul><ul><li>The user who attempts to perform functions in a system is in fact the user who is authorised to do so. </li></ul>
  3. 3. Identification -present what the user has Verification -Verify the validity of the ID Identification Authentication -Authenticate who the user is VALID VALID ACCESS GRANTED VALID ACCESS DENIED NOT VALID NOT VALID
  4. 4. METHODS OF AUTHENTICATION <ul><li>Biometric device </li></ul><ul><li>Device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. </li></ul><ul><li>Callback system </li></ul><ul><li>The checking system that authenticates the user. </li></ul>
  5. 5. BIOMETRIC DEVICES <ul><li>FINGERPRINT RECOGNITION </li></ul><ul><li>Besides checking the fingerprint, it also measures blood flow to avoid a fake finger from being used. </li></ul><ul><li>FACIAL RECOGNITION </li></ul><ul><li>It analyses the characteristics of an individual's face images captured through a digital video camera. </li></ul><ul><li>HAND GEOMETRY SCANNING </li></ul><ul><li>It involves the measurement and analysis of the shape of a person’s hand. </li></ul>
  6. 6. <ul><li>IRIS SCANNING </li></ul><ul><li>It analyses the features that exist in the coloured tissues surrounding the pupil which has more than 200 points that can be used for comparison, including rings, furrows and freckles. </li></ul><ul><li>The scans use a regular video camera and work perfectly fine through glasses and has the ability to create an accurate enough measurement. </li></ul><ul><li>RETINAL SCANNING </li></ul><ul><li>It involves the scanning of retina and analysing the layer of blood vessels at the back of the eye. </li></ul><ul><li>VOICE RECOGNITION </li></ul><ul><li>It compares a person’s live speech with the stored voice pattern in the database. </li></ul><ul><li>SIGNATURE VERIFICATION SYSTEM </li></ul><ul><li>The authenticity of a writer is determined by comparing an input signature to a stored reference set (template) consisting of three signatures. </li></ul>
  7. 8. CALLBACK SYSTEM <ul><li>The callback system is commonly used in the bank operation and business transaction. </li></ul><ul><li>For example, when you called a McDonald Delivery Services, the operator wil ask you to hang up since he wants to link you with the other worker. </li></ul>
  8. 9. CONCLUSION <ul><li>Authentication is important in order to safeguard against the unauthorised access and use. </li></ul><ul><li>REFERENCES </li></ul><ul><li>ICT Note Form 4 </li></ul><ul><li>http://slideshare.net/ict-security-measures-81805 </li></ul>

×