2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet560/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   556   557   558   559   560   561   562   563   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Keystroke Patterns Keystroke patterns
(also known as 
keystroke dynamics
) measure 
how a subject uses a keyboard by analyzing flight time and dwell time. 
Flight time
is how 
long it takes between key presses, and 
dwell time
is how long a key is pressed. Using key-
stroke patterns is inexpensive, nonintrusive, and often transparent to the user (for both use 
and enrollment). Unfortunately, keystroke patterns are subject to wild variances. Simple 
changes in user behavior greatly affect this biometric factor, such as using only one hand, 
being cold, standing rather than sitting, changing keyboards, or sustaining an injury to the 
hand or a finger.
The use of biometrics promises universally unique identification for every person 
on the planet. Unfortunately, biometric technology has yet to live up to this prom-
ise. However, technologies that focus on physical characteristics are very useful for 
authentication.
Biometric Factor Error Ratings
The most important aspect of a biometric device is its accuracy. To use biometrics for 
identification, a biometric device must be able to detect minute differences in information, 
such as variations in the blood vessels in a person’s retina or differences in a person’s veins 
in their palm. Because most people are basically similar, biometric methods often result 
in false negative and false positive authentications. Biometric devices are rated for perfor-
mance by examining the different types of errors they produce.
False Rejection Rate
A false rejection occurs when a valid subject is not authenticated. As 
an example, Dawn has registered her fingerprint and used it to authenticate herself before. 
Imagine that she uses her fingerprint to authenticate herself today, but the system incor-
rectly rejects her fingerprint as valid. This is sometimes called a false negative authentica-
tion. The ratio of false rejections to valid authentications is known as the 
false rejection 
rate (FRR)
. False rejection is sometimes called a 
Type I error
.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   556   557   558   559   560   561   562   563   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish