SlideShare a Scribd company logo
www.studentyogi.com   www.studentyogi.com




                       co om
    Biometrics


                          m
                    gi. .c
                  oogi
               ntyy
             eent
        t t dd
     ssuu
   w. .
   w
ww




                         Presented by
                        Ratna Sudha.R
ww




www.studentyogi.com   www.studentyogi.com
www.studentyogi.com      www.studentyogi.com




                                    m
                                  co
            CONTENTS


                             gi.
 1. Introduction
                      tyo
 2. Security and authentication
 3. Methods of verification
      a. Psychological verification
                  en
           i. Finger Print.
          ii. Hand Print.
         iii. Face Measurement.
             d


         iv. Retinal Scanning.
         stu



          v. DNA Analysis.
      b.Behavioral verification
           i. Typing.
     w.




          ii. Signature.
         iii. Voice.
ww




 4. Identification.

www.studentyogi.com      www.studentyogi.com
www.studentyogi.com                      www.studentyogi.com

   5. Verification.
   6. Advantages




                                                        m
   7. Limitations
   8. Conclusion.




                                                      co
   9. References




                                              gi.
                                    tyo
                        Introduction
                             en
              Biometrics is an advanced technology for superb security and
authentication .The very term "biometric” it represent that "bio" means
related to the biological study and "metric " means something, which is
                      d

related to measurement. In network environment security is a crucial factor.
Provide security to pages in the network is to difficulty. Password is not a
                  stu


good measurement for security. Good security mechanism is necessary on
the Internet. Security in different levels applies to various documents.
Security is depends how security assign to documents. Security depends on
following categories.
           w.




   1.   Confidential
   2.   Secret
   3.   Non-secret
ww




   4.   Public



www.studentyogi.com                      www.studentyogi.com
www.studentyogi.com                        www.studentyogi.com

       Confidential pages over the network provide full security. No way to
tamper data in the page by third party. In this case biometrics are more
useful and no way to disturb the page contents. First of all store all data




                                                           m
about biometrics in database after that tally with this data. If tally satisfies
with backend then provide access to the user. Collecting information is too
difficult and store in database also need more space.




                                                         co
There are two security methodologies in Biometrics, they are

1.Token-based security:




                                                 gi.
     It relies on the users special item -token like card-id.

2.Secret based security:
                                      tyo
      It relies on an individual secret id number like password.

       Neither of the two can accurately determine whether the password
that posses a token nor knows some secret information of the individual it
represents. Tokens can be stolen and information can be guessed or
                               en
fraudulently obtained.
                     d
                 stu


       Biometric is a technology where the password for entry is you, which
identifies your psychological and behavioral characteristics.

               Security and Authentication
          w.




      Web-Based Enterprise Management (WBEM) supports a limited form
of security for the Microsoft® Windows® 98 platform that involves
validating a user's logon for the local machine and for remote access. A
ww




validated user is granted access to the entire Common Information Model
(CIM) schema. WBEM does not secure system resources, such as individual
classes, instances, and namespaces. Security is limited because Windows 98

www.studentyogi.com                        www.studentyogi.com
www.studentyogi.com                      www.studentyogi.com

is not a secure operating system and does not support file system or registry
security.
       All security-related information is represented by instances of WBEM




                                                         m
system classes located in the RootSecurity namespace. These classes and
instances can only appear in the RootSecurity namespace and must remain
there permanently.




                                                       co
      The WBEM Administrator application can be used to set permissions
for WBEM users. It is similar to the User Manager application supplied




                                               gi.
with Microsoft® Windows NT®.
      In WBEM, all security accounts are referred to as subjects. There are
two types of subjects: user and group. Users are represented by instances of
the NTLMUser system class, which describes individual users. Groups are
                                     tyo
represented by instances of the NTLMGroup system class, which describes
multiple users. Both the NTLMUser and NTLMGroup classes derive
indirectly from the subject system class, an abstract class that is not
intended to be used for instantiation. More directly, NTLMUser derives
                              en
from the generic User class and NTLMGroup derives from the generic
Group class.
                     d

Permissions:
                 stu


      Microsoft SQL Server uses permissions to enforce database security.
The SQL Server permissions system specifies which users are authorized to
use which Transact-SQL statements, views, and stored procedures. The
         w.




ability to assign permissions is determined by each user's status (as SA,
ww




database owner, or database object owner). Permissions are set on database
users or groups, not on login IDs.


www.studentyogi.com                      www.studentyogi.com
www.studentyogi.com                       www.studentyogi.com

Permission Hierarchy:
      SQL Server's permissions system recognizes four types of users: the
SA, database owners, database object owners, and other users of the




                                                          m
database.
      The different types of users exist in a hierarchy (explained in the




                                                        co
following sections and illustrated below).




                                                gi.
                       System Administrator

                             Database owners
                                     tyo
                             Database object owners
                                     Database users
                              en
      Only the SA and database owners can grant statement permissions to
other users.
                     d

Different Security Mechanisms:
                 stu


       To help you understand the information presented in this chapter, we
begin by defining some security-related terms. This brief list of definitions
is not intended to serve as a comprehensive SQL Server glossary. It is
provided as a quick reference to help you understand some of the security
         w.




elements discussed throughout this chapter. You may find it useful to refer
back to this list of security definitions as you read through this chapter and
through Chapter 9, "Managing Security."
ww




alias
      An alias is a database username that is shared by several login IDs. A
database alias allows you to treat more than one person as the same user

www.studentyogi.com                       www.studentyogi.com
www.studentyogi.com                      www.studentyogi.com




                                                        m
inside a database, giving all of them the same permissions. Any username in




                                                      co
a database can also serve as an alias.
      Aliases are often used so that several users can assume the role of
database owner.




                                              gi.
Database object owner
      Database objects are tables, indexes, views, defaults, triggers, rules,
and procedures. The user who creates a database object is the database
                                     tyo
object owner and is automatically granted all permissions on it. The
database object owner can grant permission to other users to use that object.
Database object ownership cannot be transferred.

database owner
                             en
      The database owner (DBO) is the creator of a database. There is only
one DBO. The DBO has full privileges inside the database that he or she
owns, and determines the access and capabilities provided to other users.
                     d

      In his or her own database, the user is recognized as DBO; in other
databases, the database owner is known by his or her database username.
                 stu



      DBO status can be reassigned to a different user. Only one login ID
can be DBO, although other login IDs can be aliased to DBO.
domain
         w.




       In Windows NT security, a domain is a collection of computers that
are grouped for viewing and administrative purposes, and that share a
common security database.
ww




group
       In SQL Server, a database group is a collection of database users. The
users receive the database permissions granted to the group. Using groups
www.studentyogi.com                      www.studentyogi.com
www.studentyogi.com                       www.studentyogi.com

simplifies management of a large number of database users, because groups
provide a convenient way to grant and revoke permissions to more than one
user at the same time.




                                                          m
       In Windows NT, a group is a collection of Windows NT users. The
users received the Windows NT rights and permissions granted to the group.
Groups provide a convenient way to manage the capabilities of a large




                                                        co
                                                gi.
number of users with similar needs, within the security scope of a domain or
a computer.                           tyo
integrated security
       Integrated security allows a SQL Server to use Windows NT
                              en
authentication mechanisms to validate logins for all connections. Only
trusted (multi-protocol or named pipes) connections are allowed.

login ID
                     d

      A login ID is a name by which a user is known to SQL Server. Login
IDs are also referred to as logins.
                 stu


      To log in to a SQL Server that is running standard security, a user
must provide a valid login ID and password.
         w.




login security mode
      The login security mode determines the manner in which a SQL
Server validates a login request. There are three types of login security:
ww




integrated, standard, and mixed.

mixed security

www.studentyogi.com                       www.studentyogi.com
www.studentyogi.com                       www.studentyogi.com

       Mixed security allows login requests to be validated using either
integrated or standard security. Trusted connections (as used by integrated
security) and nontrusted connections (as used by standard security) can be




                                                         m
established.

object permissions




                                                       co
      Object permissions regulate the use of certain statements on certain
database objects. They are granted and revoked by the owner of the object.

permissions




                                               gi.
      Microsoft SQL Server uses permissions to enforce database security.
The SQL Server permissions system specifies which users are authorized to
use which Transact-SQL statements, views, and stored procedures. The
                                     tyo
                              en
ability to assign permissions is determined by each user's status (as SA,
database owner, or database object owner).
                     d

There are two types: object permissions and statement permissions.
standard security
                 stu


       Standard security uses SQL Server's own login validation process for
all connections. To log in to a SQL Server, each user must provide a valid
login ID and password.
         w.




statement permissions
      Statement permissions provide the privilege to issue certain Transact-
SQL statements. Statement permissions are not object-specific. They can be
granted only by the SA or the database owner.
ww




    Statement permissions apply to these statements: CREATE
DATABASE, CREATE DEFAULT, CREATE PROCEDURE, CREATE

www.studentyogi.com                       www.studentyogi.com
www.studentyogi.com                      www.studentyogi.com

RULE, CREATE TABLE, CREATE VIEW, DUMP DATABASE, and
DUMP TRANSACTION.
      Statement permissions are also called command permissions.




                                                        m
system administrator
       The system administrator (SA) is the person responsible for the




                                                      co
administrative and operational functions that are independent of any
particular application, and is likely to be a person with a comprehensive
overview of SQL Server and all its applications.




                                               gi.
       Administering SQL Server typically includes such tasks as installing
SQL Server; configuring servers and clients; managing and monitoring the
use of disk space, memory, and connections; creating devices and databases;
authorizing SQL Server users and granting them permissions; transferring
                                     tyo
data in and out of SQL Server databases; backing up and restoring
databases; implementing and maintaining replication; scheduling
unattended operations; monitoring and tuning SQL Server performance; and
diagnosing system problems. The system administrator may also advise
application designers about the data that already exists on SQL Server,
                             en
make recommendations about standardizing data definitions across
applications, and so on.
                     d
                 stu
         w.




     The system administrator operates outside the protection system,
which means that SQL Server does no permission checking for the system
ww




administrator. The system administrator is also treated as the owner of
whatever database he or she is using. Anyone who knows the SA password


www.studentyogi.com                      www.studentyogi.com
www.studentyogi.com                       www.studentyogi.com

can log in and act as system administrator (unless the server is running in
Integrated login security mode).




                                                         m
trusted connections
       Integrated security requires network protocols that support




                                                       co
authenticated connections between clients and servers. These are referred to
as trusted connections. The multi-protocol and named pipe protocols
provide trusted connections.




                                               gi.
      Note that nontrusted connections (connections over other network
protocols that do not support authenticated connections) must be handled by
using SQL Server standard security.  tyo
username
       In SQL Server, a database username is a name assigned to a login ID
                              en
for the purpose of allowing a user to have access to a database. The abilities
a user has within a database depend on the permissions granted to the
username (and to any groups the username is a member of).
                     d


       In Windows NT, a username is the name by which the user is known
                 stu


to the domain, or to an individual Windows NT computer. A user logs on to
a domain or computer by providing a valid username and password. The
abilities of the user depend on the Windows NT rights and permissions
granted to that username and to any Windows NT groups the username is a
         w.




member of.
ww




www.studentyogi.com                       www.studentyogi.com
www.studentyogi.com                        www.studentyogi.com




                                                          m
              Method of Verification




                                                        co
1.PSYCHOLOGICAL VERIFICATION

             Psychological Verification involves in the verification of the




                                                gi.
organs of the human being, which will have unique identification and does
not match with others.



   I.   Fingerprint.
                                      tyo
There are five types of verifications. These are:


  II.   Handprint.
 III.   Face measurement.
                              en
 IV.    Retinal scans.
  V.    DNA analysis.

I. Finger print: It involves the user placing his finger over a glass-plate,
                     d

which resides over a high-resolution camera, which uses optical or
                 stu


electromagnetic means to take its snapshot. The software analysis your
finger for pattern such as loops, worls and arches.

Advantages:
          w.




      a. This technology is neither too expensive nor does it require
extensive user training.
      b. It also simple to implement.
ww




      c. Finger print system has FAR<0.5%
      d. It is oldest known technique that is still used in criminal records
and forensic.

www.studentyogi.com                        www.studentyogi.com
www.studentyogi.com                        www.studentyogi.com

      Imagine the number if unique finger prints that might need to be
stored and then accessed in a database. This necessities the use of easier




                                                           m
indexing and matching.




                                                         co
                                                 gi.
                                      tyo
                     d         en
                 stu
          w.




       In US super market, customers give their credit card information and
other personal details to store and tie it with their fingerprint data. The next
time, he can pay for purchases without a fingerprint.
ww




Disadvantages:
       1.Any injures of fingers effect more.


www.studentyogi.com                        www.studentyogi.com
www.studentyogi.com                      www.studentyogi.com

II. Hand print:
      It compares a 3D image of the users hand to that present in the system
database. It is somewhat similar to finger print verification.




                                                       m
Advantage:
     a. Accuracy is better than fingerprint.




                                                     co
     b. Cheap and easy to deploy.

Disadvantage:
        a. Complex in usage.




                                               gi.
        b. Implementation is expensive.
        c. Any damages to hand effect more.

                                    tyo
                             en
III. Face measurement:
       Measuring this is as simple as taking a picture and analyzing the
image from a security video capture. This technique enables the computer to
use your face as your password and matching these to an existing database.
                    d
                stu


Advantage:
     a. Most continents at public places.
     b. Less expensive.

Disadvantage:
         w.




        a. Inaccurate is affected by changes in lighting, age, and
           movement, glass.
        b. Face creams also effect the measurements.
ww




www.studentyogi.com                      www.studentyogi.com
www.studentyogi.com                       www.studentyogi.com




                                                          m
                                                        co
                                               gi.
                                     tyo
                     d        en
                 stu



IV. Retinal scans:
         w.




       It involves imaging of the blood vessels in the retina of the eye when
infrared light of a certain frequency and wavelength is incident upon it.this
energy is absorbed by the blood vessels is different in different individuals.
ww




      The retinal iris patterns are unique to individuals than any biometric
yet devised.

www.studentyogi.com                       www.studentyogi.com
www.studentyogi.com                        www.studentyogi.com

       The retina is an internal part of the eye located at the back of the eye
and is get of thin nerve which sense the light coming through a camera,




                                                           m
pupil, eye lenses.

      The pattern of blood vessels which makeup retina are unique to each




                                                         co
individual i.e., <1.2 inch.

Advantage:
     a. Accurate with no false match in 2 million people.




                                                gi.
     b. It s sophisticated process.

Disadvantages:
                                      tyo
        c. Expensive, difficult to deploy and use.
        d. Focus of light effect measurements.
                     d         en
                 stu
          w.
ww




www.studentyogi.com                        www.studentyogi.com
www.studentyogi.com                       www.studentyogi.com




                                                          m
                                                        co
                                                gi.
                                      tyo
                              en
V. DNA Analysis:
      It involves in checking the DNA pattern of a human used when
physical characteristics are unrecognizable. It is used to identify people,
                     d

who are died, to find out the relationship like identifying Childs natural
parents.
                 stu



       This is one Biometric that is judicially accepted. No human have
identified DNA patterns except in twins.
         w.




Advantages:
     a. DNA samples can be collected from toothbrush, clothes.

Disadvantages:
ww




        e. DNA testing takes longer time than other methods.
        f. Twins have same DNA.
        g. Researchers produce same DNA.
www.studentyogi.com                       www.studentyogi.com
www.studentyogi.com                      www.studentyogi.com




                                                        m
                                                      co
2.BEHAVOURAL VERIFICATION




                                              gi.
      This involves in oral thing done by the individual. There are 3 types
of behavioral verifications,

   1. Typing
   2. Signature
   3. Voice
                                     tyo
1. Typing:
                             en
       Some systems measure things you do in addition to the things you
are, you will notice that your typing has a certain pattern. Some letters
follow others in quick succession, while others take longer.
                      d

      Software called Bio password is available for less than $100.It
                  stu


integrates with Windows 2000.Windows NT.Login to provide this
authentication without the need for any additional software. This measure is
a behavioral characteristic of a person.

2. Signature:
         w.




      Some qualities looked into include acceleration rates, direction, and
pressure and stroke length. Here mainly concentrate on pressures. This
pressures stored in back end for future significations.
ww




Disadvantages:


www.studentyogi.com                      www.studentyogi.com
www.studentyogi.com                       www.studentyogi.com

      a. The disadvantage with the technology lies in the randomness or the
consistency with which a user makes his signature. If pressures are not tally
with stored pressure in the database.




                                                          m
3. Voice:
      It involves in the recognition of the voice of the individual.




                                                        co
Advantages:
  1) It is inexpensive.
  2) It also works through telephone.




                                                gi.
  3) Some person mimicry with other person voices.


                                      tyo
Disadvantages:
     a. One can mimic the voice of the individual.
                              en
      Biometric does not guarantee security. It simply offers ore convenient
and reliable means of identification and authentication.
                     d


              Mixed form Biometrics
                 stu



      Some times use more than one form biometrics. This mixed form
provide more security. Here combine more than one type. Even 80% equals
with database then access provide to user.
         w.
ww




www.studentyogi.com                       www.studentyogi.com
www.studentyogi.com                      www.studentyogi.com




                                                        m
                                                      co
                                               gi.
                                     tyo
                     d       en
                 stu
         w.




                        Identification
ww




    It is a process of recognition and involves taking the biometric data and
searching for the match in the database asking it a slow process that it is
more prone to errors.

www.studentyogi.com                      www.studentyogi.com
www.studentyogi.com                      www.studentyogi.com

Authentication:




                                                        m
      It involves confirming your identity and the biometric systems have
to match your data with only one, single record.




                                                      co
      Depending on the technique used, Biometric have varying levels of
accuracy .The system might let you pass in one attempt on Monday and
require five on Tuesday.




                                               gi.
     The accuracy of any biometric system is measured in terms of FAR
and FRR.

FAR (False Acceptance Rates):        tyo
      Where an imposer is accepted as a match. It is a probability of falsely
accepting a metric as a match.

FRR (False Rejection Rates):
                             en
      Where a legal match is denied. Where the system sails to recognize an
authentic Bio-signature.
                     d

       As FRR increases, the FAR goes down and vice versa.
Almost all biometric systems can be adjusted to varying levels of strictness
                 stu


to create a variation in FAR and FRR. For a system to be successful, both
have to be with in acceptable low limits.
         w.




                          Advantages
ww




      It provide good security mechanism than all other security methods

www.studentyogi.com                      www.studentyogi.com
www.studentyogi.com                         www.studentyogi.com

      It never fails in security constraints.
      In public locations such as banks and airports a large number of
      people transit every day including known criminals. Face recognition




                                                            m
      systems attached to video surveillance systems are supposed to help
      catch them.
      A professor recently published his techniques for fooling finger print




                                                          co
      scanners. He found that Optical finger print scanners can be fooled by
      silicon rubber. However electro magnetic scanners would reject those,
      because electrical characteristics are different from that of a live
      finger.




                                                 gi.
                           Limitations
                                       tyo
      It needs high memory space in the back end.
      Collect data for security is difficult
      Some times fails the security with right users
      Any time data loose in database high effect for security mechanism.
                               en
      So many equipments are needed for provide this technology.
      It highly expensive
                      d

                            Conclusion
                  stu



               Security is not just about putting big locks on the front door; it
also involves making sure all the windows are shut. Each one can be
individually fooled, but the comparison makes the system more secure as a
          w.




whole. Biometrics are have its own advantages and disadvantages. It high
expensive but it provide good security. Money is not important than
security. It is more useful for confidential maters.
ww




www.studentyogi.com                         www.studentyogi.com
www.studentyogi.com       www.studentyogi.com




                                    m
                                  co
                 References




                               gi.
http://Biometrics.com
http://whitepapers.com   tyo
http://www.milesresearch.com
http://microsoft/biometrics.com
                   en
IT Magazines
              d
          stu
      w.
ww




www.studentyogi.com       www.studentyogi.com

More Related Content

Similar to Bio Metrics Paper Presentation

Analysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure DatabaseAnalysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure Database
IOSR Journals
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
ASAITHAMBIRAJAA
 
Database Security - IG
Database Security - IGDatabase Security - IG
Database Security - IG
Anne Lee
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
Rajashree Swain
 
original.pdf
original.pdforiginal.pdf
original.pdf
PranavUndre1
 
Creating Secure Social Applications
Creating Secure Social ApplicationsCreating Secure Social Applications
Creating Secure Social Applications
Tyler Browning
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
IGEEKS TECHNOLOGIES
 
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
IJERA Editor
 
D0312427
D0312427D0312427
D0312427
iosrjournals
 
3D-Password
3D-Password 3D-Password
3D-Password
Devyani Vaidya
 
Database security
Database securityDatabase security
Database security
keerthusandeepreddy
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET Journal
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
Jyotishkar Dey
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
Editor IJCATR
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
Sahithi Naraparaju
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
IRJET Journal
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
MaximaSheffield592
 
Paper2
Paper2Paper2

Similar to Bio Metrics Paper Presentation (20)

Analysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure DatabaseAnalysis of Various Attributes to Have a Secure Database
Analysis of Various Attributes to Have a Secure Database
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
 
Database Security - IG
Database Security - IGDatabase Security - IG
Database Security - IG
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
original.pdf
original.pdforiginal.pdf
original.pdf
 
Creating Secure Social Applications
Creating Secure Social ApplicationsCreating Secure Social Applications
Creating Secure Social Applications
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...The Recent Trend: Vigorous unidentified validation access control system with...
The Recent Trend: Vigorous unidentified validation access control system with...
 
D0312427
D0312427D0312427
D0312427
 
3D-Password
3D-Password 3D-Password
3D-Password
 
Database security
Database securityDatabase security
Database security
 
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
 
Distributed database security with discretionary access control
Distributed database security with discretionary access controlDistributed database security with discretionary access control
Distributed database security with discretionary access control
 
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
A Privacy Preserving Attribute Based Access Control Mechanism In Distributed ...
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
IRJET - Improving Password System using Blockchain
IRJET - Improving Password System using BlockchainIRJET - Improving Password System using Blockchain
IRJET - Improving Password System using Blockchain
 
CHAPTER 7 Authentication and Authorization On
CHAPTER  7 Authentication and Authorization OnCHAPTER  7 Authentication and Authorization On
CHAPTER 7 Authentication and Authorization On
 
Paper2
Paper2Paper2
Paper2
 

More from guestac67362

5 I N T R O D U C T I O N T O A E R O S P A C E T R A N S P O R T A T I O...
5  I N T R O D U C T I O N  T O  A E R O S P A C E  T R A N S P O R T A T I O...5  I N T R O D U C T I O N  T O  A E R O S P A C E  T R A N S P O R T A T I O...
5 I N T R O D U C T I O N T O A E R O S P A C E T R A N S P O R T A T I O...
guestac67362
 
4 G Paper Presentation
4 G  Paper  Presentation4 G  Paper  Presentation
4 G Paper Presentation
guestac67362
 
Bluetooth Technology Paper Presentation
Bluetooth Technology Paper PresentationBluetooth Technology Paper Presentation
Bluetooth Technology Paper Presentation
guestac67362
 
Ce052391 Environmental Studies Set1
Ce052391 Environmental Studies Set1Ce052391 Environmental Studies Set1
Ce052391 Environmental Studies Set1
guestac67362
 
Bluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless CommunicationsBluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless Communications
guestac67362
 
Bio Chip Paper Presentation
Bio Chip Paper PresentationBio Chip Paper Presentation
Bio Chip Paper Presentation
guestac67362
 
Bluetooth Paper Presentation
Bluetooth Paper PresentationBluetooth Paper Presentation
Bluetooth Paper Presentation
guestac67362
 
Bio Medical Instrumentation
Bio Medical InstrumentationBio Medical Instrumentation
Bio Medical Instrumentation
guestac67362
 
Bluetooth Abstract Paper Presentation
Bluetooth Abstract Paper PresentationBluetooth Abstract Paper Presentation
Bluetooth Abstract Paper Presentation
guestac67362
 
Basic Electronics Jntu Btech 2008
Basic Electronics Jntu Btech 2008Basic Electronics Jntu Btech 2008
Basic Electronics Jntu Btech 2008
guestac67362
 
Basic electronic devices and circuits
Basic electronic devices and circuitsBasic electronic devices and circuits
Basic electronic devices and circuits
guestac67362
 
Awp
AwpAwp
Automatic Speed Control System Paper Presentation
Automatic Speed Control System Paper PresentationAutomatic Speed Control System Paper Presentation
Automatic Speed Control System Paper Presentation
guestac67362
 
Artificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper PresentationArtificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper Presentation
guestac67362
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural Networks
guestac67362
 
Automata And Compiler Design
Automata And Compiler DesignAutomata And Compiler Design
Automata And Compiler Design
guestac67362
 
Auto Configuring Artificial Neural Paper Presentation
Auto Configuring Artificial Neural Paper PresentationAuto Configuring Artificial Neural Paper Presentation
Auto Configuring Artificial Neural Paper Presentation
guestac67362
 
Artificial Neural Network Paper Presentation
Artificial Neural Network Paper PresentationArtificial Neural Network Paper Presentation
Artificial Neural Network Paper Presentation
guestac67362
 
A Paper Presentation On Artificial Intelligence And Global Risk Paper Present...
A Paper Presentation On Artificial Intelligence And Global Risk Paper Present...A Paper Presentation On Artificial Intelligence And Global Risk Paper Present...
A Paper Presentation On Artificial Intelligence And Global Risk Paper Present...
guestac67362
 
Applied Physics Jntu Btech 2008
Applied Physics Jntu Btech 2008Applied Physics Jntu Btech 2008
Applied Physics Jntu Btech 2008
guestac67362
 

More from guestac67362 (20)

5 I N T R O D U C T I O N T O A E R O S P A C E T R A N S P O R T A T I O...
5  I N T R O D U C T I O N  T O  A E R O S P A C E  T R A N S P O R T A T I O...5  I N T R O D U C T I O N  T O  A E R O S P A C E  T R A N S P O R T A T I O...
5 I N T R O D U C T I O N T O A E R O S P A C E T R A N S P O R T A T I O...
 
4 G Paper Presentation
4 G  Paper  Presentation4 G  Paper  Presentation
4 G Paper Presentation
 
Bluetooth Technology Paper Presentation
Bluetooth Technology Paper PresentationBluetooth Technology Paper Presentation
Bluetooth Technology Paper Presentation
 
Ce052391 Environmental Studies Set1
Ce052391 Environmental Studies Set1Ce052391 Environmental Studies Set1
Ce052391 Environmental Studies Set1
 
Bluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless CommunicationsBluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless Communications
 
Bio Chip Paper Presentation
Bio Chip Paper PresentationBio Chip Paper Presentation
Bio Chip Paper Presentation
 
Bluetooth Paper Presentation
Bluetooth Paper PresentationBluetooth Paper Presentation
Bluetooth Paper Presentation
 
Bio Medical Instrumentation
Bio Medical InstrumentationBio Medical Instrumentation
Bio Medical Instrumentation
 
Bluetooth Abstract Paper Presentation
Bluetooth Abstract Paper PresentationBluetooth Abstract Paper Presentation
Bluetooth Abstract Paper Presentation
 
Basic Electronics Jntu Btech 2008
Basic Electronics Jntu Btech 2008Basic Electronics Jntu Btech 2008
Basic Electronics Jntu Btech 2008
 
Basic electronic devices and circuits
Basic electronic devices and circuitsBasic electronic devices and circuits
Basic electronic devices and circuits
 
Awp
AwpAwp
Awp
 
Automatic Speed Control System Paper Presentation
Automatic Speed Control System Paper PresentationAutomatic Speed Control System Paper Presentation
Automatic Speed Control System Paper Presentation
 
Artificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper PresentationArtificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper Presentation
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural Networks
 
Automata And Compiler Design
Automata And Compiler DesignAutomata And Compiler Design
Automata And Compiler Design
 
Auto Configuring Artificial Neural Paper Presentation
Auto Configuring Artificial Neural Paper PresentationAuto Configuring Artificial Neural Paper Presentation
Auto Configuring Artificial Neural Paper Presentation
 
Artificial Neural Network Paper Presentation
Artificial Neural Network Paper PresentationArtificial Neural Network Paper Presentation
Artificial Neural Network Paper Presentation
 
A Paper Presentation On Artificial Intelligence And Global Risk Paper Present...
A Paper Presentation On Artificial Intelligence And Global Risk Paper Present...A Paper Presentation On Artificial Intelligence And Global Risk Paper Present...
A Paper Presentation On Artificial Intelligence And Global Risk Paper Present...
 
Applied Physics Jntu Btech 2008
Applied Physics Jntu Btech 2008Applied Physics Jntu Btech 2008
Applied Physics Jntu Btech 2008
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Bio Metrics Paper Presentation

  • 1. www.studentyogi.com www.studentyogi.com co om Biometrics m gi. .c oogi ntyy eent t t dd ssuu w. . w ww Presented by Ratna Sudha.R ww www.studentyogi.com www.studentyogi.com
  • 2. www.studentyogi.com www.studentyogi.com m co CONTENTS gi. 1. Introduction tyo 2. Security and authentication 3. Methods of verification a. Psychological verification en i. Finger Print. ii. Hand Print. iii. Face Measurement. d iv. Retinal Scanning. stu v. DNA Analysis. b.Behavioral verification i. Typing. w. ii. Signature. iii. Voice. ww 4. Identification. www.studentyogi.com www.studentyogi.com
  • 3. www.studentyogi.com www.studentyogi.com 5. Verification. 6. Advantages m 7. Limitations 8. Conclusion. co 9. References gi. tyo Introduction en Biometrics is an advanced technology for superb security and authentication .The very term "biometric” it represent that "bio" means related to the biological study and "metric " means something, which is d related to measurement. In network environment security is a crucial factor. Provide security to pages in the network is to difficulty. Password is not a stu good measurement for security. Good security mechanism is necessary on the Internet. Security in different levels applies to various documents. Security is depends how security assign to documents. Security depends on following categories. w. 1. Confidential 2. Secret 3. Non-secret ww 4. Public www.studentyogi.com www.studentyogi.com
  • 4. www.studentyogi.com www.studentyogi.com Confidential pages over the network provide full security. No way to tamper data in the page by third party. In this case biometrics are more useful and no way to disturb the page contents. First of all store all data m about biometrics in database after that tally with this data. If tally satisfies with backend then provide access to the user. Collecting information is too difficult and store in database also need more space. co There are two security methodologies in Biometrics, they are 1.Token-based security: gi. It relies on the users special item -token like card-id. 2.Secret based security: tyo It relies on an individual secret id number like password. Neither of the two can accurately determine whether the password that posses a token nor knows some secret information of the individual it represents. Tokens can be stolen and information can be guessed or en fraudulently obtained. d stu Biometric is a technology where the password for entry is you, which identifies your psychological and behavioral characteristics. Security and Authentication w. Web-Based Enterprise Management (WBEM) supports a limited form of security for the Microsoft® Windows® 98 platform that involves validating a user's logon for the local machine and for remote access. A ww validated user is granted access to the entire Common Information Model (CIM) schema. WBEM does not secure system resources, such as individual classes, instances, and namespaces. Security is limited because Windows 98 www.studentyogi.com www.studentyogi.com
  • 5. www.studentyogi.com www.studentyogi.com is not a secure operating system and does not support file system or registry security. All security-related information is represented by instances of WBEM m system classes located in the RootSecurity namespace. These classes and instances can only appear in the RootSecurity namespace and must remain there permanently. co The WBEM Administrator application can be used to set permissions for WBEM users. It is similar to the User Manager application supplied gi. with Microsoft® Windows NT®. In WBEM, all security accounts are referred to as subjects. There are two types of subjects: user and group. Users are represented by instances of the NTLMUser system class, which describes individual users. Groups are tyo represented by instances of the NTLMGroup system class, which describes multiple users. Both the NTLMUser and NTLMGroup classes derive indirectly from the subject system class, an abstract class that is not intended to be used for instantiation. More directly, NTLMUser derives en from the generic User class and NTLMGroup derives from the generic Group class. d Permissions: stu Microsoft SQL Server uses permissions to enforce database security. The SQL Server permissions system specifies which users are authorized to use which Transact-SQL statements, views, and stored procedures. The w. ability to assign permissions is determined by each user's status (as SA, ww database owner, or database object owner). Permissions are set on database users or groups, not on login IDs. www.studentyogi.com www.studentyogi.com
  • 6. www.studentyogi.com www.studentyogi.com Permission Hierarchy: SQL Server's permissions system recognizes four types of users: the SA, database owners, database object owners, and other users of the m database. The different types of users exist in a hierarchy (explained in the co following sections and illustrated below). gi. System Administrator Database owners tyo Database object owners Database users en Only the SA and database owners can grant statement permissions to other users. d Different Security Mechanisms: stu To help you understand the information presented in this chapter, we begin by defining some security-related terms. This brief list of definitions is not intended to serve as a comprehensive SQL Server glossary. It is provided as a quick reference to help you understand some of the security w. elements discussed throughout this chapter. You may find it useful to refer back to this list of security definitions as you read through this chapter and through Chapter 9, "Managing Security." ww alias An alias is a database username that is shared by several login IDs. A database alias allows you to treat more than one person as the same user www.studentyogi.com www.studentyogi.com
  • 7. www.studentyogi.com www.studentyogi.com m inside a database, giving all of them the same permissions. Any username in co a database can also serve as an alias. Aliases are often used so that several users can assume the role of database owner. gi. Database object owner Database objects are tables, indexes, views, defaults, triggers, rules, and procedures. The user who creates a database object is the database tyo object owner and is automatically granted all permissions on it. The database object owner can grant permission to other users to use that object. Database object ownership cannot be transferred. database owner en The database owner (DBO) is the creator of a database. There is only one DBO. The DBO has full privileges inside the database that he or she owns, and determines the access and capabilities provided to other users. d In his or her own database, the user is recognized as DBO; in other databases, the database owner is known by his or her database username. stu DBO status can be reassigned to a different user. Only one login ID can be DBO, although other login IDs can be aliased to DBO. domain w. In Windows NT security, a domain is a collection of computers that are grouped for viewing and administrative purposes, and that share a common security database. ww group In SQL Server, a database group is a collection of database users. The users receive the database permissions granted to the group. Using groups www.studentyogi.com www.studentyogi.com
  • 8. www.studentyogi.com www.studentyogi.com simplifies management of a large number of database users, because groups provide a convenient way to grant and revoke permissions to more than one user at the same time. m In Windows NT, a group is a collection of Windows NT users. The users received the Windows NT rights and permissions granted to the group. Groups provide a convenient way to manage the capabilities of a large co gi. number of users with similar needs, within the security scope of a domain or a computer. tyo integrated security Integrated security allows a SQL Server to use Windows NT en authentication mechanisms to validate logins for all connections. Only trusted (multi-protocol or named pipes) connections are allowed. login ID d A login ID is a name by which a user is known to SQL Server. Login IDs are also referred to as logins. stu To log in to a SQL Server that is running standard security, a user must provide a valid login ID and password. w. login security mode The login security mode determines the manner in which a SQL Server validates a login request. There are three types of login security: ww integrated, standard, and mixed. mixed security www.studentyogi.com www.studentyogi.com
  • 9. www.studentyogi.com www.studentyogi.com Mixed security allows login requests to be validated using either integrated or standard security. Trusted connections (as used by integrated security) and nontrusted connections (as used by standard security) can be m established. object permissions co Object permissions regulate the use of certain statements on certain database objects. They are granted and revoked by the owner of the object. permissions gi. Microsoft SQL Server uses permissions to enforce database security. The SQL Server permissions system specifies which users are authorized to use which Transact-SQL statements, views, and stored procedures. The tyo en ability to assign permissions is determined by each user's status (as SA, database owner, or database object owner). d There are two types: object permissions and statement permissions. standard security stu Standard security uses SQL Server's own login validation process for all connections. To log in to a SQL Server, each user must provide a valid login ID and password. w. statement permissions Statement permissions provide the privilege to issue certain Transact- SQL statements. Statement permissions are not object-specific. They can be granted only by the SA or the database owner. ww Statement permissions apply to these statements: CREATE DATABASE, CREATE DEFAULT, CREATE PROCEDURE, CREATE www.studentyogi.com www.studentyogi.com
  • 10. www.studentyogi.com www.studentyogi.com RULE, CREATE TABLE, CREATE VIEW, DUMP DATABASE, and DUMP TRANSACTION. Statement permissions are also called command permissions. m system administrator The system administrator (SA) is the person responsible for the co administrative and operational functions that are independent of any particular application, and is likely to be a person with a comprehensive overview of SQL Server and all its applications. gi. Administering SQL Server typically includes such tasks as installing SQL Server; configuring servers and clients; managing and monitoring the use of disk space, memory, and connections; creating devices and databases; authorizing SQL Server users and granting them permissions; transferring tyo data in and out of SQL Server databases; backing up and restoring databases; implementing and maintaining replication; scheduling unattended operations; monitoring and tuning SQL Server performance; and diagnosing system problems. The system administrator may also advise application designers about the data that already exists on SQL Server, en make recommendations about standardizing data definitions across applications, and so on. d stu w. The system administrator operates outside the protection system, which means that SQL Server does no permission checking for the system ww administrator. The system administrator is also treated as the owner of whatever database he or she is using. Anyone who knows the SA password www.studentyogi.com www.studentyogi.com
  • 11. www.studentyogi.com www.studentyogi.com can log in and act as system administrator (unless the server is running in Integrated login security mode). m trusted connections Integrated security requires network protocols that support co authenticated connections between clients and servers. These are referred to as trusted connections. The multi-protocol and named pipe protocols provide trusted connections. gi. Note that nontrusted connections (connections over other network protocols that do not support authenticated connections) must be handled by using SQL Server standard security. tyo username In SQL Server, a database username is a name assigned to a login ID en for the purpose of allowing a user to have access to a database. The abilities a user has within a database depend on the permissions granted to the username (and to any groups the username is a member of). d In Windows NT, a username is the name by which the user is known stu to the domain, or to an individual Windows NT computer. A user logs on to a domain or computer by providing a valid username and password. The abilities of the user depend on the Windows NT rights and permissions granted to that username and to any Windows NT groups the username is a w. member of. ww www.studentyogi.com www.studentyogi.com
  • 12. www.studentyogi.com www.studentyogi.com m Method of Verification co 1.PSYCHOLOGICAL VERIFICATION Psychological Verification involves in the verification of the gi. organs of the human being, which will have unique identification and does not match with others. I. Fingerprint. tyo There are five types of verifications. These are: II. Handprint. III. Face measurement. en IV. Retinal scans. V. DNA analysis. I. Finger print: It involves the user placing his finger over a glass-plate, d which resides over a high-resolution camera, which uses optical or stu electromagnetic means to take its snapshot. The software analysis your finger for pattern such as loops, worls and arches. Advantages: w. a. This technology is neither too expensive nor does it require extensive user training. b. It also simple to implement. ww c. Finger print system has FAR<0.5% d. It is oldest known technique that is still used in criminal records and forensic. www.studentyogi.com www.studentyogi.com
  • 13. www.studentyogi.com www.studentyogi.com Imagine the number if unique finger prints that might need to be stored and then accessed in a database. This necessities the use of easier m indexing and matching. co gi. tyo d en stu w. In US super market, customers give their credit card information and other personal details to store and tie it with their fingerprint data. The next time, he can pay for purchases without a fingerprint. ww Disadvantages: 1.Any injures of fingers effect more. www.studentyogi.com www.studentyogi.com
  • 14. www.studentyogi.com www.studentyogi.com II. Hand print: It compares a 3D image of the users hand to that present in the system database. It is somewhat similar to finger print verification. m Advantage: a. Accuracy is better than fingerprint. co b. Cheap and easy to deploy. Disadvantage: a. Complex in usage. gi. b. Implementation is expensive. c. Any damages to hand effect more. tyo en III. Face measurement: Measuring this is as simple as taking a picture and analyzing the image from a security video capture. This technique enables the computer to use your face as your password and matching these to an existing database. d stu Advantage: a. Most continents at public places. b. Less expensive. Disadvantage: w. a. Inaccurate is affected by changes in lighting, age, and movement, glass. b. Face creams also effect the measurements. ww www.studentyogi.com www.studentyogi.com
  • 15. www.studentyogi.com www.studentyogi.com m co gi. tyo d en stu IV. Retinal scans: w. It involves imaging of the blood vessels in the retina of the eye when infrared light of a certain frequency and wavelength is incident upon it.this energy is absorbed by the blood vessels is different in different individuals. ww The retinal iris patterns are unique to individuals than any biometric yet devised. www.studentyogi.com www.studentyogi.com
  • 16. www.studentyogi.com www.studentyogi.com The retina is an internal part of the eye located at the back of the eye and is get of thin nerve which sense the light coming through a camera, m pupil, eye lenses. The pattern of blood vessels which makeup retina are unique to each co individual i.e., <1.2 inch. Advantage: a. Accurate with no false match in 2 million people. gi. b. It s sophisticated process. Disadvantages: tyo c. Expensive, difficult to deploy and use. d. Focus of light effect measurements. d en stu w. ww www.studentyogi.com www.studentyogi.com
  • 17. www.studentyogi.com www.studentyogi.com m co gi. tyo en V. DNA Analysis: It involves in checking the DNA pattern of a human used when physical characteristics are unrecognizable. It is used to identify people, d who are died, to find out the relationship like identifying Childs natural parents. stu This is one Biometric that is judicially accepted. No human have identified DNA patterns except in twins. w. Advantages: a. DNA samples can be collected from toothbrush, clothes. Disadvantages: ww e. DNA testing takes longer time than other methods. f. Twins have same DNA. g. Researchers produce same DNA. www.studentyogi.com www.studentyogi.com
  • 18. www.studentyogi.com www.studentyogi.com m co 2.BEHAVOURAL VERIFICATION gi. This involves in oral thing done by the individual. There are 3 types of behavioral verifications, 1. Typing 2. Signature 3. Voice tyo 1. Typing: en Some systems measure things you do in addition to the things you are, you will notice that your typing has a certain pattern. Some letters follow others in quick succession, while others take longer. d Software called Bio password is available for less than $100.It stu integrates with Windows 2000.Windows NT.Login to provide this authentication without the need for any additional software. This measure is a behavioral characteristic of a person. 2. Signature: w. Some qualities looked into include acceleration rates, direction, and pressure and stroke length. Here mainly concentrate on pressures. This pressures stored in back end for future significations. ww Disadvantages: www.studentyogi.com www.studentyogi.com
  • 19. www.studentyogi.com www.studentyogi.com a. The disadvantage with the technology lies in the randomness or the consistency with which a user makes his signature. If pressures are not tally with stored pressure in the database. m 3. Voice: It involves in the recognition of the voice of the individual. co Advantages: 1) It is inexpensive. 2) It also works through telephone. gi. 3) Some person mimicry with other person voices. tyo Disadvantages: a. One can mimic the voice of the individual. en Biometric does not guarantee security. It simply offers ore convenient and reliable means of identification and authentication. d Mixed form Biometrics stu Some times use more than one form biometrics. This mixed form provide more security. Here combine more than one type. Even 80% equals with database then access provide to user. w. ww www.studentyogi.com www.studentyogi.com
  • 20. www.studentyogi.com www.studentyogi.com m co gi. tyo d en stu w. Identification ww It is a process of recognition and involves taking the biometric data and searching for the match in the database asking it a slow process that it is more prone to errors. www.studentyogi.com www.studentyogi.com
  • 21. www.studentyogi.com www.studentyogi.com Authentication: m It involves confirming your identity and the biometric systems have to match your data with only one, single record. co Depending on the technique used, Biometric have varying levels of accuracy .The system might let you pass in one attempt on Monday and require five on Tuesday. gi. The accuracy of any biometric system is measured in terms of FAR and FRR. FAR (False Acceptance Rates): tyo Where an imposer is accepted as a match. It is a probability of falsely accepting a metric as a match. FRR (False Rejection Rates): en Where a legal match is denied. Where the system sails to recognize an authentic Bio-signature. d As FRR increases, the FAR goes down and vice versa. Almost all biometric systems can be adjusted to varying levels of strictness stu to create a variation in FAR and FRR. For a system to be successful, both have to be with in acceptable low limits. w. Advantages ww It provide good security mechanism than all other security methods www.studentyogi.com www.studentyogi.com
  • 22. www.studentyogi.com www.studentyogi.com It never fails in security constraints. In public locations such as banks and airports a large number of people transit every day including known criminals. Face recognition m systems attached to video surveillance systems are supposed to help catch them. A professor recently published his techniques for fooling finger print co scanners. He found that Optical finger print scanners can be fooled by silicon rubber. However electro magnetic scanners would reject those, because electrical characteristics are different from that of a live finger. gi. Limitations tyo It needs high memory space in the back end. Collect data for security is difficult Some times fails the security with right users Any time data loose in database high effect for security mechanism. en So many equipments are needed for provide this technology. It highly expensive d Conclusion stu Security is not just about putting big locks on the front door; it also involves making sure all the windows are shut. Each one can be individually fooled, but the comparison makes the system more secure as a w. whole. Biometrics are have its own advantages and disadvantages. It high expensive but it provide good security. Money is not important than security. It is more useful for confidential maters. ww www.studentyogi.com www.studentyogi.com
  • 23. www.studentyogi.com www.studentyogi.com m co References gi. http://Biometrics.com http://whitepapers.com tyo http://www.milesresearch.com http://microsoft/biometrics.com en IT Magazines d stu w. ww www.studentyogi.com www.studentyogi.com