Ict Security Measures


Published on

Published in: Business, Technology
No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Ict Security Measures

  1. 1. Security Measures (Biometrics, Authetications) Contents: <ul><li>Authentication </li></ul><ul><li>Methods of Authentication </li></ul><ul><li>Biometric Devices </li></ul>910913-02-5011 IC. No Ahmad Syamil B. Hassan Name
  2. 2. Authentication <ul><li>Is the process where users verifies that they are who they say they are. </li></ul><ul><li>The user who attempts to perform functions in a system is in fact the user who is authorised to do so. </li></ul>
  3. 3. Authentication Access Denied Access Granted Verification - Verify the validity of the ID Identification Not valid Not valid Valid Valid Valid Identification - Present what the user has. Authentication - Authenticate who the user is.
  4. 4. Methods of Authentications <ul><li>There are two commonly used authentication methods. They are biometric devices and callback system </li></ul>Biometric Devices <ul><li>It is a device that translates personal characteristic into a digital code that is compared with a digital code stored in the database </li></ul><ul><li>Examples of biometric device is fingerprint recognition, facial recognition, hand geometry, iris scanning, retinal scanning, voice recognition and signature verification system. </li></ul>
  5. 5. <ul><li>Fingerprint Recognition </li></ul><ul><li>It also measure blood flow, or check for correctly arrayed ridges at the edges of the fingers </li></ul><ul><li>Facial Recognition </li></ul><ul><li>Analyses the characteristics of an individual’s face images captured through a digital video camera. </li></ul><ul><li>Hand Geometry Scanning </li></ul><ul><li>Involves the measurement and analysis of the shape of one’s hand. </li></ul><ul><li>Iris Scanning </li></ul><ul><li>Analyses the features that exists in the coloured tissues surrounding the pupil which has more than 200 points that can be used for comparison including rings and freckles. </li></ul><ul><li>The scans use a regular video camera and can be done from further away than a retinal scan. </li></ul>
  6. 6. <ul><li>Retinal Scanning </li></ul><ul><li>Involves the scanning of retina and analysing the layer of blood vessels at the back of the eye </li></ul><ul><li>Involves using the low intensity of light source and optical coupler and can read the patterns at a great level of accuracy. </li></ul><ul><li>The accuracy is very good and the cost is fair. </li></ul><ul><li>Requires the user to remove glasses and place their eye close to the device. </li></ul><ul><li>Voice Recognition </li></ul><ul><li>Compares a person’s live speech with their stored voice patterns. </li></ul><ul><li>Requires user to speak into a microphone. </li></ul><ul><li>What he speaks can be his password or access phrase. </li></ul><ul><li>Verification time is approximately 5 seconds. To prevent recorded voice use, most recognition devices require the high and low frequencies of the sound to match. </li></ul>
  7. 7. <ul><li>Signature Verification System </li></ul><ul><li>Recognises the shape of your hand written signature as well as measuring the pressure exerted and the motion used to write the signature. </li></ul><ul><li>Uses special pen and a special tablet. </li></ul><ul><li>After pre-processing the signature, several features extracted. </li></ul><ul><li>The authenticity of a writer is determined by comparing an input signature to a stored reference set consisting of three signatures. </li></ul><ul><li>The accuracy is fair and the cost involved is excellent </li></ul>
  8. 8. Conclusion <ul><li>Authentication is very important to prevent unauthorised access of a person’s data. </li></ul><ul><li>References </li></ul><ul><li>ICT Form 4 Note book </li></ul>
  9. 9. SULTAN ABDUL HAMID COLLEGE The End presented by: Ahmad Syamil Bin Hassan