Access control devices-cryptography, Computer Network Security


Successful access control system includes number of components, which depends on system’s requirements for authentication and authorization. Powerful authentication requires at least 2 forms of authentication to authenticate the supplicant’s identity. The skill to manage authentication based on what a supplicant knows is extensively integrated into the networking and security software systems in use across IT industry.


Authentication is validation of a supplicant’s identity. There are four basic ways to carry out authentication. They are given as follows:
a)What a supplicant knows
b) What a supplicant has
c)Who a supplicant is
d) What a supplicant produces

The area of authentication deals with the characteristic supplicant’s person. This process of using body measurements is called as bio-metrics.

Biometrics includes the following:

•Fingerprint – Comparison is made of supplicant’s actual fingerprint to a stored fingerprint.
•Palm print – Comparison is made of supplicant’s actual palm print to a stored palm print.
•Hand Geometry – Comparison is made of supplicant’s actual hand to a stored measurement.
•Facial recognition by using a photographic ID card – a human security guard properly compares supplicant’s face to a photo.
•Facial recognition by using a digital camera – a supplicant’s face is compared properly  to a stored image.
•Retinal print – Comparison is made of supplicant’s actual retina to a stored image.
•Iris pattern – Comparison is made of supplicant’s actual iris to a stored image.

The following are the only 3 human characteristics are considered truly unique. They are stated below:
1) Fingerprints.
2)Retina of the eye.
3)Iris of the eye.

 Effectiveness of Biometrics

Biometric technologies are evaluated based on following 3 basic criteria:
- False reject rate
- False accept rate
- Crossover error rate (CER)

 Acceptability of Biometrics

Acceptability of Biometrics depends on balance that should be struck between how acceptable security system is to users and the effectiveness of it in maintaining security. Many biometric systems which are highly reliable and effective are considered intrusive. As a result of this, many information security professionals, in an effort to stay away from confrontation and possible user boycott of biometric controls, which do not implement them. Table given below illustrates the ranking of Effectiveness and Acceptance.


1340_Access control devices-cryptography.png

Posted Date: 10/9/2012 2:46:38 AM | Location : United States

Related Discussions:- Access control devices-cryptography, Assignment Help, Ask Question on Access control devices-cryptography, Get Answer, Expert's Help, Access control devices-cryptography Discussions

Write discussion on Access control devices-cryptography
Your posts are moderated
Related Questions
Question: (a) Explain the following terms: Information Communication Technology, Operating System and Application Software. (b) Define what a computer is, give four anatomi

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular c

Host-Based IDS A host-based IDS (HIDS) resides on a particular computer or server and monitors activity only on that system. HIDS also called as system integrity verifiers as th

Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

Routers They transfer packets among multiple interconnected network machines (i.e. LANs of different kind). They perform in the data link, physical and network layers. They ha

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

Consider the details of the X.509 certificate shown below. a. Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the nam

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

Question: a) Explain what you understand by the term brute force attack, giving an example of such an attack b) Briefly outline the concept of Caesar cipher and identify a