Access control devices-cryptography, Computer Network Security

ACCESS CONTROL DEVICES

Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful authentication requires at least 2 forms of authentication to authenticate the supplicant’s identity. The skill to manage authentication based on what a supplicant knows is extensively integrated into the networking and security software systems in use across IT industry.

 Authentication


Authentication is validation of a supplicant’s identity. There are four basic ways to carry out authentication. They are given as follows:
a)What a supplicant knows
b) What a supplicant has
c)Who a supplicant is
d) What a supplicant produces

Biometrics
The area of authentication deals with the characteristic supplicant’s person. This process of using body measurements is called as bio-metrics.

Biometrics includes the following:

•Fingerprint – Comparison is made of supplicant’s actual fingerprint to a stored fingerprint.
•Palm print – Comparison is made of supplicant’s actual palm print to a stored palm print.
•Hand Geometry – Comparison is made of supplicant’s actual hand to a stored measurement.
•Facial recognition by using a photographic ID card – a human security guard properly compares supplicant’s face to a photo.
•Facial recognition by using a digital camera – a supplicant’s face is compared properly  to a stored image.
•Retinal print – Comparison is made of supplicant’s actual retina to a stored image.
•Iris pattern – Comparison is made of supplicant’s actual iris to a stored image.

The following are the only 3 human characteristics are considered truly unique. They are stated below:
1) Fingerprints.
2)Retina of the eye.
3)Iris of the eye.


 Effectiveness of Biometrics


Biometric technologies are evaluated based on following 3 basic criteria:
- False reject rate
- False accept rate
- Crossover error rate (CER)


 Acceptability of Biometrics

Acceptability of Biometrics depends on balance that should be struck between how acceptable security system is to users and the effectiveness of it in maintaining security. Many biometric systems which are highly reliable and effective are considered intrusive. As a result of this, many information security professionals, in an effort to stay away from confrontation and possible user boycott of biometric controls, which do not implement them. Table given below illustrates the ranking of Effectiveness and Acceptance.

 

1340_Access control devices-cryptography.png

Posted Date: 10/9/2012 2:46:38 AM | Location : United States







Related Discussions:- Access control devices-cryptography, Assignment Help, Ask Question on Access control devices-cryptography, Get Answer, Expert's Help, Access control devices-cryptography Discussions

Write discussion on Access control devices-cryptography
Your posts are moderated
Related Questions
STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

(a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of the above, expla

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP

Encryption Key Size When using ciphers, the size of crypto variable or key is quite important as the strength of many encryption applications and cryptosystems were measured by

QUESTION: a) Explain four issues that are generally addressed in the Needs Analysis phase in the building-block approach to network design. b) Sketch a typical hybrid star-b

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

ROUTING TABLE For efficiency, information about forwarding is saved in a routing table, which is started at system initialization and must be updated as network topology modif

(a) Mention the five main security services. (b) What is a passive attack? Give an example of passive attack? (c) What four types of active attacks and mention their respecti