SlideShare a Scribd company logo
o

o

Process where user verify that they are who they
say they are.
The user who attempts to perform function in a
system is in fact the user who is authorized to do
so.
METHOD OF
Device

that translate personal
characteristic into a digital code
stored in the database









Fingerprint Recognition
Facial Recognition
Hand Geometry Scanning
Iris Scanning
Retinal Scanning
Voice Recognition
Signature Verification System
o To

prevent fake finger from being
used
o Measure blood flow or check
correctly arrayed ridges
o Analyses

the characteristic of an
individual’s face images
o Capture through a digital video
camera
o Touted as a fantastic system for
recognizing potential treats
Measure and analysis of the shape of
one’s hand
o Individual features are not descriptive
for identification
o Possible to devise a method by
combining various individual and
measurement of finger and hands
o
o

o

o

Analyses the feature that exist in the
coloured tissue surrounding the pupil
The scan use a regular video camera and
can be done from further away thank a
retinal scan
Will work perfectly and get the accurate
measurement that can be use in
identification purpose
o

o

o

o

Scanning the retina and analysing the layer of
blood vessel at the back of the eye
Using a low-intensity light source and a optical
coupler
Requires user to remove glasses , place their eye
to the device and focus on a certain point
The accuracy is very good and the cost is fair
o
o

o

o

Compares a person’s live speech with their stored
voice pattern
Requires user to speak into a microphone and the
word or anything that he speaks can be his
password or an access phrase
Most voice recognition devices require the high and
low frequencies of the sound to match , which is
difficult for many recording instrument to recreate
well
Fair and the cost reasonable
o

o
o

o

o

Recognizes the shape of user handwritten signature as
measuring the pressure exerted and the motion use to
write the signature
Special pen and tab are used
The authenticity is determined by , comparing an input
signature to a stored reference set (template) consisting
of three signature
The similarity between input signature are reference set
is computed using string matching and compared to a
threshold
Fair and the price is excellent
Picture 2 : Visualization of iris scan and extracted “IrisCode”
Picture (C) IriScan , Inc.
Picture 3 : Digitized fingerprint image with the minutiae points
extracted.
Image (C) 1998 Idex AS
Picture 4 : Hand with biometric measurements visualized
Image (C) Michigan State University
o

From this assignment I can conclude that authentication
is one of the security measure . One of the method of
authentication is Biometric Devices . The biometric
method is the method that are commonly use . There
are seven example of Biometric . From this assignment ,
I also find out that the Fingerprint Recognition is the
best method because the fingerprint is very unique ,
different person will have the different fingerprint . It also
the best method because the accuracy in this method is
good and the cost involved is cheaper than the other
method .
o Reference
ICT form 4 book

o Internet
http://www.iriscan.com/basic.htm

More Related Content

What's hot

Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
mmubashirkhan
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
Ankita Vanage
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
Ned Hayes
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
Amit Pandey
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
s-mueller
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
Sn Moddho
 
Biometric security
Biometric securityBiometric security
Biometric security
Tanner Stuewe
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
Viraj Rajopadhye
 
Biometric
Biometric Biometric
Biometric
Vinay Gupta
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
prachi
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
MOUNIKA VINNAKOTA
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
ANEESH SASIDHARAN
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
Sheel Shah
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
Praween Lakra
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
anasz
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
OECLIB Odisha Electronics Control Library
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
eSAT Journals
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
Shamili Nookala
 
Bio shiv
Bio shivBio shiv
Bio shiv
Shivank Garg
 

What's hot (20)

Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometric security
Biometric securityBiometric security
Biometric security
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
Biometric
Biometric Biometric
Biometric
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Bio shiv
Bio shivBio shiv
Bio shiv
 

Viewers also liked

Security Measure
Security MeasureSecurity Measure
Security Measure
syafiqa
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
Syazzey Waniey II
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
hanna91
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
joy grace bagui
 
Network Security
Network SecurityNetwork Security
Network Security
Joe Baker
 
Persembahan multimedia
Persembahan multimediaPersembahan multimedia
Persembahan multimediamazlinamaskor
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
Manish Singh
 
The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)
Roger Johnston
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
Pace IT at Edmonds Community College
 
Router hardening project.slide
Router hardening project.slideRouter hardening project.slide
Router hardening project.slide
Alya Al Saadi
 
Skyscraper Security Mgt Part II- by Richard Garrity
Skyscraper Security Mgt  Part II- by Richard GarritySkyscraper Security Mgt  Part II- by Richard Garrity
Skyscraper Security Mgt Part II- by Richard Garrity
Richard Garrity
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
IBM Business Insight
 
Quick & Easy Online Multimedia Projects
Quick & Easy Online Multimedia ProjectsQuick & Easy Online Multimedia Projects
Quick & Easy Online Multimedia Projects
Nancy Fitzgerald
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
Einar Landre
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
edavid2685
 
ConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personal
Ericsson
 
Assignment ICT Multimedia 'Pembentukan Pelangi'
Assignment  ICT Multimedia 'Pembentukan Pelangi'Assignment  ICT Multimedia 'Pembentukan Pelangi'
Assignment ICT Multimedia 'Pembentukan Pelangi'
Nuzue LieYana
 
Perkumuhan
PerkumuhanPerkumuhan
Perkumuhan
Mohd Faizal Hashim
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
Linaro
 
LCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEELCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEE
Linaro
 

Viewers also liked (20)

Security Measure
Security MeasureSecurity Measure
Security Measure
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Network Security
Network SecurityNetwork Security
Network Security
 
Persembahan multimedia
Persembahan multimediaPersembahan multimedia
Persembahan multimedia
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
 
Router hardening project.slide
Router hardening project.slideRouter hardening project.slide
Router hardening project.slide
 
Skyscraper Security Mgt Part II- by Richard Garrity
Skyscraper Security Mgt  Part II- by Richard GarritySkyscraper Security Mgt  Part II- by Richard Garrity
Skyscraper Security Mgt Part II- by Richard Garrity
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Quick & Easy Online Multimedia Projects
Quick & Easy Online Multimedia ProjectsQuick & Easy Online Multimedia Projects
Quick & Easy Online Multimedia Projects
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
ConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personal
 
Assignment ICT Multimedia 'Pembentukan Pelangi'
Assignment  ICT Multimedia 'Pembentukan Pelangi'Assignment  ICT Multimedia 'Pembentukan Pelangi'
Assignment ICT Multimedia 'Pembentukan Pelangi'
 
Perkumuhan
PerkumuhanPerkumuhan
Perkumuhan
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
LCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEELCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEE
 

Similar to Security measures (Microsoft Powerpoint)

Biometrics
BiometricsBiometrics
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
TrushaKyada
 
biometric technology
biometric technologybiometric technology
biometric technology
Anmol Bagga
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
Vishak Illath veed
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
Manoj Kumar
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
Swapnil Bangera
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
sakshi_20
 
Biometrics
BiometricsBiometrics
Biometrics
Sandeep Kamath
 
Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
YUSRA FERNANDO
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
Abhishek Walia
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometrics
BiometricsBiometrics
Biometrics
shweta-sharma99
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Madugula Kumar
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
SureshKumarMaurya5
 
Biometrics
BiometricsBiometrics
Biometrics
VerronBriscoe
 
Biometrics
BiometricsBiometrics
Biometrics
Shivani Gautam
 

Similar to Security measures (Microsoft Powerpoint) (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

Security measures (Microsoft Powerpoint)

  • 1.
  • 2. o o Process where user verify that they are who they say they are. The user who attempts to perform function in a system is in fact the user who is authorized to do so.
  • 4. Device that translate personal characteristic into a digital code stored in the database
  • 5.        Fingerprint Recognition Facial Recognition Hand Geometry Scanning Iris Scanning Retinal Scanning Voice Recognition Signature Verification System
  • 6. o To prevent fake finger from being used o Measure blood flow or check correctly arrayed ridges
  • 7. o Analyses the characteristic of an individual’s face images o Capture through a digital video camera o Touted as a fantastic system for recognizing potential treats
  • 8. Measure and analysis of the shape of one’s hand o Individual features are not descriptive for identification o Possible to devise a method by combining various individual and measurement of finger and hands o
  • 9. o o o Analyses the feature that exist in the coloured tissue surrounding the pupil The scan use a regular video camera and can be done from further away thank a retinal scan Will work perfectly and get the accurate measurement that can be use in identification purpose
  • 10. o o o o Scanning the retina and analysing the layer of blood vessel at the back of the eye Using a low-intensity light source and a optical coupler Requires user to remove glasses , place their eye to the device and focus on a certain point The accuracy is very good and the cost is fair
  • 11. o o o o Compares a person’s live speech with their stored voice pattern Requires user to speak into a microphone and the word or anything that he speaks can be his password or an access phrase Most voice recognition devices require the high and low frequencies of the sound to match , which is difficult for many recording instrument to recreate well Fair and the cost reasonable
  • 12. o o o o o Recognizes the shape of user handwritten signature as measuring the pressure exerted and the motion use to write the signature Special pen and tab are used The authenticity is determined by , comparing an input signature to a stored reference set (template) consisting of three signature The similarity between input signature are reference set is computed using string matching and compared to a threshold Fair and the price is excellent
  • 13. Picture 2 : Visualization of iris scan and extracted “IrisCode” Picture (C) IriScan , Inc.
  • 14. Picture 3 : Digitized fingerprint image with the minutiae points extracted. Image (C) 1998 Idex AS
  • 15. Picture 4 : Hand with biometric measurements visualized Image (C) Michigan State University
  • 16. o From this assignment I can conclude that authentication is one of the security measure . One of the method of authentication is Biometric Devices . The biometric method is the method that are commonly use . There are seven example of Biometric . From this assignment , I also find out that the Fingerprint Recognition is the best method because the fingerprint is very unique , different person will have the different fingerprint . It also the best method because the accuracy in this method is good and the cost involved is cheaper than the other method .
  • 17. o Reference ICT form 4 book o Internet http://www.iriscan.com/basic.htm