Biometric Authentication - Software Training

nauseatingcynicalSécurité

22 févr. 2014 (il y a 3 années et 8 mois)

123 vue(s)

Chapter 8: Grad Course Assignment


BIOMETRICS AUTHENTICATION


presented at U of M


August 2012

Protect
Information
Resources

Manage User
Identities

Prevent
Unauthorized
Access

Ensuring System
Availability

Chapter 8: Biometric Authentication by
Angela

BIOMETRICS AUTHENTICATION


Systems Read & Interprets:




Individual Traits…….


Fingerprints


Eye Scans


Voice Recognition


Heart beat



Grant or Deny Access to Systems or Data


Chapter 8: Biometric Authentication by
Angela

Heartbeat Signature


Intel purchased
Indesia’s

Biometrics


Technology
through
which heartbeats can be
used to recognize users on PCs & mobile
devices



Chapter 8: Biometric Authentication by
Angela

Monitor Heart
Beat

Provides Intel
More Advanced &
Secure way to
Recognize Users

Example:

Create Sensor for
Smartphone or
Tablet to monitor
heartbeat

Finger Swiping


Laptops


Scan your Finger vs. Password


Flash Drives


Imation Defender F200


Biometric Finger Swiping


Level 3 govt. security


4GB (cost $159)


64GB (cost $649)



Chapter 8: Biometric Authentication by
Angela

Finger Swiping
(cont.)


HEALTHCARE


Saratoga Hospital, NY


Solution to Login & Access problems for its over
1700 doctors, nurses, and staff


Doctors use Fingerprint Readers


scan their finger
to log into Saratoga’s network


Nurses use portable PCs to easily login & logout
without Password


Education, Government, and Other Industries


Chapter 8: Biometric Authentication by
Angela

Education, Government, & Other Businesses


Chapter 8: Biometric Authentication by
Angela

Voice Recognition Software


A few U.S. banks require customers to Identify
themselves using:


Pin Number
and


Two
-
second Phrase over the Phone

Chapter 8: Biometric Authentication by
Angela

Face Recognition


Android phones unlock themselves


At the Recognition of their owner’s face



Facebook acquired FACE.COM


Already an App for FB (called Photo Tagger)


Identifies FB users in Photos & Live Video


Chapter 8: Biometric Authentication by
Angela

Iris Scans

Chapter 8: Biometric Authentication by
Angela

Police Departments


Smartphone
-
based retina scanning


Runs the scan against a criminal database


Phone cost ($3,000)


Banks


To open new accounts

Advantages & Disadvantages


PROS


BUSINESS
OPPORTUNITIES for
Entrepreneurs


Quicker Login


Goodbye……


Passwords


Pin numbers


Easier To:


Track


Identify





CONS


COST


Software & Hardware


Maintenance & Upgrades


LEGAL & PRIVACY ISSUES


Criminal Activities


Hackers


Easier To:


Track


Identify


Stalk






Chapter 8: Biometric Authentication by
Angela

Works Cited


Laudon, Kenneth and Laudon, Jane, “
Management Information Systems


Managing the Digital Firm
”, 12
th

Edition, Upper Saddle River, New Jersey,
2012, pgs. 313


314.


http://www.pcworld.com/article/254757/imation_defender_f200_biometric_flash
_drive_review_secure_but_slow.html


http://www.smartplanet.com/blog/science
-
scope/the
-
future
-
of
-
the
-
password
-
could
-
be
-
biometric/11711


http://www.informationweek.com/news/healthcare/security
-
privacy/232602165


http://www.pcworld.com/article/257832/facebook_buys_facecom_prepare_for_e
asier_photo_tagging.html


www.moneycrashers.com/biometrics
-
cashless
-
society


www.cio.com/article/709836/Intel_Confirms_Acquisition_of_Heart_beat_Biometri
cs_Company_Idesia


http://www.youtube.com/watch?v=ciu2qa_DcUU




Chapter 8: Biometric Authentication by
Angela