2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet557/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   553   554   555   556   557   558   559   560   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Biometrics
Another common authentication and identification technique is the use of 
biometrics

Biometric factors
fall into the Type 3, something you are, authentication category.


596
Chapter 13 

Managing Identity and Authentication
Biometric factors can be used as an identifying or authentication technique, or both. 
Using a biometric factor instead of a username or account ID as an identification fac-
tor requires a one-to-many search of the offered biometric pattern against a stored 
database of enrolled and authorized patterns. Capturing a single image of a person 
and searching a database of many people looking for a match is an example of a one-
to-many search. As an identification technique, biometric factors are used in physical 
access controls.
Using a biometric factor as an authentication technique requires a one-to-one match of 
the offered biometric pattern against a stored pattern for the offered subject identity. In 
other words, the user claims an identity, and the biometric factor is checked to see if the 
person matches the claimed identity. As an authentication technique, biometric factors are 
used in logical access controls.
Biometric characteristics are often defined as either physiological or behavioral. 
Physiological biometric methods include fingerprints, face scans, retina scans, iris scans, 
palm scans (also known as palm topography or palm geography), hand geometry, and 
voice patterns. Behavioral biometric methods include signature dynamics and keystroke 
patterns (keystroke dynamics). These are sometimes referred to as something-you-do 
authentication.
Fingerprints Fingerprints
are the visible patterns on the fingers and thumbs of people. 
They are unique to an individual and have been used for decades in physical security for 
identification. Fingerprint readers are now commonly used on laptop computers and USB 
flash drives as a method of identification and authentication.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   553   554   555   556   557   558   559   560   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish