SlideShare uma empresa Scribd logo
1 de 17
o

o

Process where user verify that they are who they
say they are.
The user who attempts to perform function in a
system is in fact the user who is authorized to do
so.
METHOD OF
Device

that translate personal
characteristic into a digital code
stored in the database









Fingerprint Recognition
Facial Recognition
Hand Geometry Scanning
Iris Scanning
Retinal Scanning
Voice Recognition
Signature Verification System
o To

prevent fake finger from being
used
o Measure blood flow or check
correctly arrayed ridges
o Analyses

the characteristic of an
individual’s face images
o Capture through a digital video
camera
o Touted as a fantastic system for
recognizing potential treats
Measure and analysis of the shape of
one’s hand
o Individual features are not descriptive
for identification
o Possible to devise a method by
combining various individual and
measurement of finger and hands
o
o

o

o

Analyses the feature that exist in the
coloured tissue surrounding the pupil
The scan use a regular video camera and
can be done from further away thank a
retinal scan
Will work perfectly and get the accurate
measurement that can be use in
identification purpose
o

o

o

o

Scanning the retina and analysing the layer of
blood vessel at the back of the eye
Using a low-intensity light source and a optical
coupler
Requires user to remove glasses , place their eye
to the device and focus on a certain point
The accuracy is very good and the cost is fair
o
o

o

o

Compares a person’s live speech with their stored
voice pattern
Requires user to speak into a microphone and the
word or anything that he speaks can be his
password or an access phrase
Most voice recognition devices require the high and
low frequencies of the sound to match , which is
difficult for many recording instrument to recreate
well
Fair and the cost reasonable
o

o
o

o

o

Recognizes the shape of user handwritten signature as
measuring the pressure exerted and the motion use to
write the signature
Special pen and tab are used
The authenticity is determined by , comparing an input
signature to a stored reference set (template) consisting
of three signature
The similarity between input signature are reference set
is computed using string matching and compared to a
threshold
Fair and the price is excellent
Picture 2 : Visualization of iris scan and extracted “IrisCode”
Picture (C) IriScan , Inc.
Picture 3 : Digitized fingerprint image with the minutiae points
extracted.
Image (C) 1998 Idex AS
Picture 4 : Hand with biometric measurements visualized
Image (C) Michigan State University
o

From this assignment I can conclude that authentication
is one of the security measure . One of the method of
authentication is Biometric Devices . The biometric
method is the method that are commonly use . There
are seven example of Biometric . From this assignment ,
I also find out that the Fingerprint Recognition is the
best method because the fingerprint is very unique ,
different person will have the different fingerprint . It also
the best method because the accuracy in this method is
good and the cost involved is cheaper than the other
method .
o Reference
ICT form 4 book

o Internet
http://www.iriscan.com/basic.htm

Mais conteúdo relacionado

Mais procurados

Biometric security tech
Biometric security techBiometric security tech
Biometric security techmmubashirkhan
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric SecurityNed Hayes
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Onlines-mueller
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric SystemsSn Moddho
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication techniqueViraj Rajopadhye
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein AuthenticationANEESH SASIDHARAN
 
Biometics technology
Biometics technologyBiometics technology
Biometics technologyPraween Lakra
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measuresanasz
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security systemeSAT Journals
 

Mais procurados (20)

Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Defending Biometric Security
Defending Biometric SecurityDefending Biometric Security
Defending Biometric Security
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Using (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality OnlineUsing (Bio)Metrics To Predict Code Quality Online
Using (Bio)Metrics To Predict Code Quality Online
 
Biometric Systems
Biometric SystemsBiometric Systems
Biometric Systems
 
Biometric security
Biometric securityBiometric security
Biometric security
 
implementation of finger vein authentication technique
implementation of finger vein authentication techniqueimplementation of finger vein authentication technique
implementation of finger vein authentication technique
 
Biometric
Biometric Biometric
Biometric
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Biometics technology
Biometics technologyBiometics technology
Biometics technology
 
I C T Security Measures
I C T   Security  MeasuresI C T   Security  Measures
I C T Security Measures
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Bio shiv
Bio shivBio shiv
Bio shiv
 

Destaque

Security Measure
Security MeasureSecurity Measure
Security Measuresyafiqa
 
Security Measures
Security MeasuresSecurity Measures
Security Measureshanna91
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measuresjoy grace bagui
 
Network Security
Network SecurityNetwork Security
Network SecurityJoe Baker
 
Persembahan multimedia
Persembahan multimediaPersembahan multimedia
Persembahan multimediamazlinamaskor
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measuresManish Singh
 
The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)Roger Johnston
 
Router hardening project.slide
Router hardening project.slideRouter hardening project.slide
Router hardening project.slideAlya Al Saadi
 
Skyscraper Security Mgt Part II- by Richard Garrity
Skyscraper Security Mgt  Part II- by Richard GarritySkyscraper Security Mgt  Part II- by Richard Garrity
Skyscraper Security Mgt Part II- by Richard GarrityRichard Garrity
 
Quick & Easy Online Multimedia Projects
Quick & Easy Online Multimedia ProjectsQuick & Easy Online Multimedia Projects
Quick & Easy Online Multimedia ProjectsNancy Fitzgerald
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems Einar Landre
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Applicationedavid2685
 
ConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalEricsson
 
Assignment ICT Multimedia 'Pembentukan Pelangi'
Assignment  ICT Multimedia 'Pembentukan Pelangi'Assignment  ICT Multimedia 'Pembentukan Pelangi'
Assignment ICT Multimedia 'Pembentukan Pelangi'Nuzue LieYana
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEELinaro
 
LCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEELCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEELinaro
 

Destaque (20)

Security Measure
Security MeasureSecurity Measure
Security Measure
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Security Measures
Security MeasuresSecurity Measures
Security Measures
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Network Security
Network SecurityNetwork Security
Network Security
 
Persembahan multimedia
Persembahan multimediaPersembahan multimedia
Persembahan multimedia
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)The Journal of Physical Security 9(2)
The Journal of Physical Security 9(2)
 
PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)PACE-IT: Network Hardening Techniques (part 1)
PACE-IT: Network Hardening Techniques (part 1)
 
Router hardening project.slide
Router hardening project.slideRouter hardening project.slide
Router hardening project.slide
 
Skyscraper Security Mgt Part II- by Richard Garrity
Skyscraper Security Mgt  Part II- by Richard GarritySkyscraper Security Mgt  Part II- by Richard Garrity
Skyscraper Security Mgt Part II- by Richard Garrity
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Quick & Easy Online Multimedia Projects
Quick & Easy Online Multimedia ProjectsQuick & Easy Online Multimedia Projects
Quick & Easy Online Multimedia Projects
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
 
System hardening - OS and Application
System hardening - OS and ApplicationSystem hardening - OS and Application
System hardening - OS and Application
 
ConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personalConsumerLab: Public safety goes personal
ConsumerLab: Public safety goes personal
 
Assignment ICT Multimedia 'Pembentukan Pelangi'
Assignment  ICT Multimedia 'Pembentukan Pelangi'Assignment  ICT Multimedia 'Pembentukan Pelangi'
Assignment ICT Multimedia 'Pembentukan Pelangi'
 
Perkumuhan
PerkumuhanPerkumuhan
Perkumuhan
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
LCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEELCU14-103: How to create and run Trusted Applications on OP-TEE
LCU14-103: How to create and run Trusted Applications on OP-TEE
 

Semelhante a Security measures (Microsoft Powerpoint)

Semelhante a Security measures (Microsoft Powerpoint) (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Chapters 3 4
Chapters 3 4Chapters 3 4
Chapters 3 4
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Presentation suresh maurya
Presentation suresh mauryaPresentation suresh maurya
Presentation suresh maurya
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Último

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Security measures (Microsoft Powerpoint)

  • 1.
  • 2. o o Process where user verify that they are who they say they are. The user who attempts to perform function in a system is in fact the user who is authorized to do so.
  • 4. Device that translate personal characteristic into a digital code stored in the database
  • 5.        Fingerprint Recognition Facial Recognition Hand Geometry Scanning Iris Scanning Retinal Scanning Voice Recognition Signature Verification System
  • 6. o To prevent fake finger from being used o Measure blood flow or check correctly arrayed ridges
  • 7. o Analyses the characteristic of an individual’s face images o Capture through a digital video camera o Touted as a fantastic system for recognizing potential treats
  • 8. Measure and analysis of the shape of one’s hand o Individual features are not descriptive for identification o Possible to devise a method by combining various individual and measurement of finger and hands o
  • 9. o o o Analyses the feature that exist in the coloured tissue surrounding the pupil The scan use a regular video camera and can be done from further away thank a retinal scan Will work perfectly and get the accurate measurement that can be use in identification purpose
  • 10. o o o o Scanning the retina and analysing the layer of blood vessel at the back of the eye Using a low-intensity light source and a optical coupler Requires user to remove glasses , place their eye to the device and focus on a certain point The accuracy is very good and the cost is fair
  • 11. o o o o Compares a person’s live speech with their stored voice pattern Requires user to speak into a microphone and the word or anything that he speaks can be his password or an access phrase Most voice recognition devices require the high and low frequencies of the sound to match , which is difficult for many recording instrument to recreate well Fair and the cost reasonable
  • 12. o o o o o Recognizes the shape of user handwritten signature as measuring the pressure exerted and the motion use to write the signature Special pen and tab are used The authenticity is determined by , comparing an input signature to a stored reference set (template) consisting of three signature The similarity between input signature are reference set is computed using string matching and compared to a threshold Fair and the price is excellent
  • 13. Picture 2 : Visualization of iris scan and extracted “IrisCode” Picture (C) IriScan , Inc.
  • 14. Picture 3 : Digitized fingerprint image with the minutiae points extracted. Image (C) 1998 Idex AS
  • 15. Picture 4 : Hand with biometric measurements visualized Image (C) Michigan State University
  • 16. o From this assignment I can conclude that authentication is one of the security measure . One of the method of authentication is Biometric Devices . The biometric method is the method that are commonly use . There are seven example of Biometric . From this assignment , I also find out that the Fingerprint Recognition is the best method because the fingerprint is very unique , different person will have the different fingerprint . It also the best method because the accuracy in this method is good and the cost involved is cheaper than the other method .
  • 17. o Reference ICT form 4 book o Internet http://www.iriscan.com/basic.htm