Security and access control using biometric technologies:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston, Mass.
Course Technology
2010
|
Ausgabe: | Internat. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXIV, 456 S. |
ISBN: | 9781435496675 1435496671 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035945873 | ||
003 | DE-604 | ||
005 | 20100908 | ||
007 | t | ||
008 | 100111s2010 |||| 00||| eng d | ||
015 | |a GBA997996 |2 dnb | ||
020 | |a 9781435496675 |c pbk |9 978-1-4354-9667-5 | ||
020 | |a 1435496671 |c pbk |9 1-4354-9667-1 | ||
035 | |a (OCoLC)635347537 | ||
035 | |a (DE-599)BVBBV035945873 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-355 | ||
084 | |a ST 177 |0 (DE-625)143604: |2 rvk | ||
100 | 1 | |a Newman, Robert |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security and access control using biometric technologies |c Robert Newman |
250 | |a Internat. ed. | ||
264 | 1 | |a Boston, Mass. |b Course Technology |c 2010 | |
300 | |a XXIV, 456 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Biometric identification | |
650 | 4 | |a Computer security | |
650 | 4 | |a Biometric identification | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Biometrie |0 (DE-588)4124925-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Biometrie |0 (DE-588)4124925-2 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018803023&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018803023 |
Datensatz im Suchindex
_version_ | 1804140935534084096 |
---|---|
adam_text | Tabletof.
INTRODUCTION
............................................................xix
PART
1
Fundamentals
CHAPTER
1
Access Control Using Biometrics
...................................................... 1
CHAPTER
2
Biometrie
Traits and Modalities
..................................................... 27
PART
2
Technology
CHAPTER
3
Biometrie
Applications and Solutions
................................................. 63
CHAPTER
4
Repositories for Database and Template Storage
...................................... 105
CHAPTER
5
Legacy and
Biometrie
Systems
..................................................... 135
CHAPTER
6
Biometrie
Multi-Factor System Design
............................................... 193
PART
3
Administration
CHAPTER
7
Policy and Program Management
.................................................. 219
CHAPTER
8
Security and Access Technologies
................................................... 249
CHAPTER
9
System Integrity and Accessibility
.................................................. 285
CHAPTER
10
Security and Privacy Issues
........................................................ 315
CHAPTER
11
Implementation and Operation Issues
............................................... 347
CHAPTER
12
Standards and Legal Environment
.................................................. 383
APPENDIX
Biometrics Vendors
............................................................. 416
GLOSSARY
............................................................... 422
END NOTES
.............................................................. 435
INDEX
.................................................................. 438
¡ii
of Contents
INTRODUCTION
XIX
PART
1
Fundamentals
CHAPTER
1
Access Control Using Biometrics
...................................................... 1
Introduction
.........................................................................2
Why Biometrics?
.....................................................................2
Biometrics Fundamentals
...............................................................3
Biometrie
Perceptions
..................................................................5
Using Biometrics
.....................................................................6
Biometrie
Methods
.................................................................... 6
Finger Scanning
................................................................... 6
Finger Geometry
.................................................................. 7
Hand Geometry
................................................................... 7
Palm Imaging
..................................................................... 8
Iris Imaging
...................................................................... 8
Retina Recognition
................................................................. 8
Face Recognition
.................................................................. 8
Voice Recognition
................................................................. 8
Signature Verification
............................................................... 9
Biometrie
Security Environment
...........................................................9
Trusted Systems
...................................................................9
Access Control
................................................................... 10
Confidentiality, Integrity, and Accessibility
............................................... 10
Using
Biometrie
Systems
............................................................ 10
Biometrie
Identification Advantages
.................................................... 12
Access Control for Physical Facilities and Resources
........................................... 12
Access Security
................................................................... 12
Access Control for Internal Personnel
................................................... 13
Access Control for Contractors, Maintenance,
Vendors, and Suppliers
............................................................. 13
Access Control for Visitors
.......................................................... 14
Techniques for Preventing Theft and Destruction
............................................. 14
Computer Authentication and Authorization
................................................ 15
Biometrie
Terms and Concepts
.......................................................... 17
Major Issues and Concerns
............................................................. 18
Security Cost Justification
.............................................................. 19
Summary
.......................................................................... 20
Key Terms
......................................................................... 21
Review Questions
.................................................................... 23
Discussion Exercises
.................................................................. 24
Hands-On Projects
................................................................... 25
vi
Table of Contents
CHAPTER
2
Biometrie
Traits and Modalities
..................................................... 27
Introduction
........................................................................28
Biometrie
Characteristics
...............................................................28
Physiological vs. Behavioral Characteristics
.............................................. 29
Identification and Verification Concepts
....................................................29
Verification or Identification
......................................................... 29
Terms and Definitions
................................................................31
Biometrie
Methodologies
..............................................................32
Finger, Palm, and Hand Biometrics
.......................................................33
Finger Biometrics
....................................................................33
Fingerprint Identification
............................................................ 35
Fingerprint Verification
............................................................. 38
Hand and Palm Biometrics
.............................................................39
Hand Geometry
.................................................................. 40
Hand Geometry Readers
............................................................ 41
Face, Iris, Retina, and Voice Biometrics
....................................................41
Ks
Biometrics
......................................................................41
Retina Biometrics
................................................................. 43
Retinal Scanning
................................................................. 44
Retina Recognition
................................................................ 44
Face Biometrics
.....................................................................45
Face Recognition
................................................................. 45
Face Verification
................................................................. 47
Voice Biometrics
....................................................................47
Voice Verification
................................................................. 49
Signatare
Biometrics
..................................................................49
Signature Scanning
................................................................ 50
Signature Verification
.............................................................. 50
Emerging
Biometrie
Technologies
........................................................52
Keystroke Dynamics
............................................................... 53
Other
Biometrie
Technologies
........................................................ 53
Biometrie
Method Advantages and Disadvantages
............................................ 55
Face Recognition
................................................................. 56
Fingerprint Identification
............................................................ 56
Hand Geometry Biometrics
.......................................................... 56
Retina Sea»
..................................................................... 56
iris Scan
....................................................................... 56
Signature
....................................................................... 56
Voice Analysis
.................................................................... 56
Summary
...........................................................................57
Key Terms
.........................................................................57
Review Questions.
.......................................,......................., ... 59
Discussion Exercises
...........................................,......................60
Hands-Ota Projects
.....................................,.............................61
Table
of Contents
vii
PART
2
Technology
CHAPTER
3
Biometrie
Applications and Solutions
................................................. 63
Introduction
........................................................................64
Legacy Applications Requirements
........................................................64
The Need for Secure Transactions
........................................................65
Biometrie
Technology on the Leading Edge
.............................................. 66
Biometrie
Application Environment
.......................................................67
An Indication of
Biometrie
Activities
................................................... 69
Using
Biometrie
Methods
.............................................................. 70
Fingerprint Recognition
............................................................ 70
Face Recognition
................................................................. 70
Speaker Recognition
............................................................... 71
Iris Recognition
.................................................................. 72
Retinal Scanning
................................................................. 73
Hand and Finger Geometry
.......................................................... 73
Signature Verification
.............................................................. 74
Biometrie
Application Solutions
.......................................................... 74
Citizen Facing
................................................................... 74
Customer Facing
................................................................. 75
Employee Facing
................................................................. 75
Application Types and Use
.......................................................... 76
Characterizing
Biometrie
Applications
.....................................................77
A Comparison of Biometrics
......................................................... 78
Using
Biometrie
Applications
.......................................................... . 78
Issues and Concerns
.................................................................. 81
Mentit}
Theft and Privacy Issues
...................................................... 81
Sociological Concerns
.............................................................. 82
Uses and Initiatives
................................................................ 82
Activities and Research
............................................................. $2
Smart Card Personalization and Distribution
............................................. 84
Upgrade of Physical Access Control Systems
.............................................. 84
Emergency Access Procedures
........................................................ 85
Biometrie
Applications and Vendors
...................................................... 85
Physical Access Control Solutions
..................................................., . 86
Time and Attendance Biometrics Solutions
............................................... 87
Financial/Transactionai Biometrics Solutions
..............................................
Щ
Laptops, PDAs, Locks. Other Biometrics Solutions
......................................... $9
Logical Access Control Biometrics Solutions
.............................................. 90
Public Domain Biometrics Applications
.................................................
*β
E-Passport Application
............................................................. 93
Personal
Biometrie
Devices
........................................................... 95
Providers of
Biometrie
Solutions
...................................................... %
Future
Applications
.................................................................. 97
ATM Machine Use
................................................................
f
7
Workstation
and Network Access
..................................................... 98
Travel and Tourism
...............................................................
f B
Internet Transactions
.............................................................. 98
Telephone
Transactions
............................................................ 9$
Public Identity Cards
................................................................ 99
Summary
..........................................................................99
viii Table of
Contents
Key
Tenns
.........................................................................99
Review
Questions
................................................................... 100
Discussion Exercises
................................................................. 101
Hands-On Projects
.................................................................. 102
CHAPTER
4
Repositories for Database and Template Storage
...................................... 105
Introduction
....................................................................... 106
Legacy Data and Database Primer
....................................................... 106
Database
...................................................................... 107
Data Storage Access
.............................................................. 108
Database Management System
......................................................... 108
Capabilities of a DBMS
.............................................................. 110
Quen Ability
...................................................................
Ill
Backup and Replication
...........................................................
Ill
Rule Enforcement
................................................................
Ill
Security
.......................................................................
Ill
Computation
...................................................................
Ill
Change and Access Logging
........................................................ 112
Automated Optimization
........................................................... 112
Metadata Repository
............................................................. 112
Integrity
...................................................................... 112
Major Features of a DBMS
............................................................ 112
Data Security
................................................................... 113
Data Integrity
.................................................................. 113
Interactive Query
................................................................ 113
Interactive Data Entry and Updating
.................................................. 113
Data Independence
............................................................... 113
Dam Storage Management
......................................................... 113
Database and Repository Security
....................................................... 114
Biometrie
Data and Databases
.......................................................... 114
Options for
Biometrie Database
Storage
................................................ 117
Biomeirie Database Issues
............................................................. 117
Trust
......................................................................... 118
Linking
....................................................................... 1
Î8
Tracking
...................................................................... 118
Confidential Data.
............................................................... 119
Database Authentication
........................................................... 120
Positive Aspects Concerning Biometrics
................................................ 120
Surveillance
.................................................................... 121
Biometrie
Databases.
................................................................ 121
DHS IDENT
Biometrie
Database
..................................................... 121
Next Generation Identification Database
............................................... 122
IEEE Bimodai Database
........................................................... 123
Biometrie
Storage System
.......................................................... 123
Motorola Metro IB Storage System
................................................... 124
NIST Database Tools
............................................................. 125
Database Security aad Integrity Issues
.................................................... 126
Physical Security overview
............................................................ 1.27
Physical Security Categories
..........,.......,......................................, . 127
Table
of Contents
їх
Human-Initiated Damage
.......................................................... 127
Power Loss
.................................................................... 123
Environmental Safeguards Recap
..................................................... 129
Summary
.........................................................................129
Key Terms
........................................................................130
Review Questions
...................................................................131
Discussion Exercises
.................................................................132
Hands-On Projects
..................................................................133
CHAPTER
5
Legacy and
Biometrie
Systems
..................................................... 135
Introduction
.......................................................................136
Computer and Information System Basics
.................................................137
Computer Systems and Computer Programs
............................................. 137
Data and Information
.............................................................
13S
Application Software Systems
....................................................... 138
Communication Network System
..................................................... 138
Security Systems Design
..............................................................139
Trusted Systems
.................................................................
J
40
E-Commerce Security and Secure Protocols
................................................ 140
Securing Electronic Transactions
..................................................... 140
Secure Protocols
................................................................. 141
Credit Card Transactions
.......................................................... 142
Electronic Commerce
............................................................. 142
Financial Transactions
............................................................ 142
Payment Protocols
...............................................................
І44
Smart Card
.................................................................... 144
Reactive and Proactive Security Systems
................................................... 145
System Configurations
............................................................ 145
Network-Based Intrusion Detection
.................................................... 146
Host-Based Intrusion Detection
...................................................... 146
Intrusion Detection System Vendors
.................................................... 146
Biometrie
System Basics
..............................................................147
The Need for Biometrics
........................................................... 148
Biometrie
Systems Functions
........................................................
І48
Attributes of
Biometrie
Systems
.......................................................... 149
Functions of
Biometrìe
Systems
......................................................
Í49
Common Aspects of
Ali Biometrie
Systems
..............................................
Î49
Characterizing Different Biometrics
................................................... 151
Issees with
Biometrie
Systems
........................................................... 151
Recognition Errors
................................................................. 152
Compromised
Biometrìe
Data
....................................................... 152
Vulnerable Points of
a Biometrie
System.
............................................... 152
Attacks
.................... ..............____.......,.......................... 152
Внмвєвіе
Method Comparisons
........................................................ 153
Hand Geometry and Handwriting
..................................................... 153
Fingerprinting
.................................................................. 155
Fingerprint Identification Systems
....................................................
Ї
JS
Fadai
Recognition
...............................................................
í
56
Eye Biometrics; iris/Retina
............................................................ 156
Retina and Iris Identification
..........................................,..............
Ϊ$Ύ
Advantages and Disadvantages of the Iris for Identification
.................................. 158
χ
Table of Contents
Voice Verification
................................................................ 159
Signature Verification Systems
....................................................... 159
Card Systems
......................................................................160
Biometrie
System Components and Processes
............................................ 161
Biometrie
System Design
..............................................................162
Biometrie
Identification Systems
........................................................ 163
Fingerprint Identification
........................................................... 163
Hand Geometry
................................................................. 163
Palm Vein Authentication
.......................................................... 163
Retina Scan
.................................................................... 163
Iris Scan
...................................................................... 163
Identity Automation
.............................................................. 164
Biometrie
ID System Components
....................................................... 164
Biometrie
Access Control
.......................................................... 166
Embedded
Biometrie
Applications
.................................................... 166
Success Factors and Design Chalienges
................................................. 167
Networked vs. Stand-Atone
Biometrie
Systems
........................................... 168
Reqeirements for a Network-Enabled
Biometrie
System
..................................... 168
Common System Requirements
...................................................... 169
Commercial and Government
Biometrie Systems.............................................
169
Project Semaphore
............................................................... 170
US-VISIT
...................................................................... 171
IAFIS
........................................................................ 173
AFIS
......................................................................... 173
ABIS......................................................................... 173
Faceft®
....................................................................... 174
BioTime®
..................................................................... 174
KoWeb™
..................................................................... 175
IrisCode™
..................................................................... 175
ТасШеЅеше™
.................................................................. 176
PORTPASS....................................................................
176
TWIC
........................................................................ 178
IDENT-IAPłS...................................................................
179
Secure Flight
................................................................... 180
Biometrie
Products
.................................................................. 182
EyeDentity Retina
Biometrie
Reader
.................................................. 182
Operation and Performance
........................................................ 183
The State of Scientific Testing of
Biometrie
ID Systems
..................................... 184
Discussion
aed
Analysis
..............................................................185
Summary
.........................................................................186
Key Terms
........................................................................187
Review Questions.
..................................................................189
Discussion Exercises
.................................................................190
Hands-On Projects
..................................................................190
CHAPTER
б
Biometrie
Multi-Factor System Design
............................................... 193
Litredacttea
.......................................................................194
Legacy
Competer
Systems
............................................................. 194
Table
of Contents
xi
Multibiometrics Defined
.............................................................. 196
Fusion Technology Developments
.................................................... 196
Sample Quality
................................................................. 198
Neural Network
................................................................. 198
Multibiometric Components
...........................................................
19S
Multibiometric System Issues
........................................................... 199
System Design
.................................................................. 199
Biometrie
System Uses
............................................................ 200
Integrating Faces and Fingerprints for Personal Identification
................................. 200
Information Fusion in Biometrics
..................................................... 201
Multibiometric Authentication
....................................................... 201
System Architectures Compared
...................................................... 202
Authentication Process Flow
........................................................ 202
Fusion at the Feature-Extraction Level
................................................. 202
Fusion at the Matching-Score Level
.................................................... 203
Fusion at the Decision Level
........................................................ 204
Effects of Multibiometrics on the User
....................................................205
Multimodal
Biometrics
............................................................ 206
Fusion Methodology
.............................................................. 207
Biometrie
Fusion Weighting
........................................................ 207
Additional
Multimodal
Considerations
................................................. 208
Production of Multibiometric Systems
.................................................... 208
Match-On-Card Process
........................................................... 208
MegaMatcher
2.0................................................................ 209
Instituto
Federal Electoral
.......................................................... 210
Analysis of Fusion and Multibiometrics
................................................ 210
Multisensory
Biometrie
Research
..................................................... 210
Large-Scale» Automatic
Biometrie
Identification System
..................................... 2
И
Analysis
..........................................................................212
Summary
......................................................................... 213
Key Terms
.........................................................................214
Review Questions
................................................................... 215
Discussion Exercises
.................................................................216
Hands-On Projects
................................................................. . 216
PART
3
Administration
CHAPTER
7
Policy and Program Management
.................................................. 219
Introduction
........................................................................ 220
Corporate Security Policy
.............................................................221
Identity Management
.................................................................221
Electronic Identity Management
..................................................... 222
System Program Management
.......................................................... 222
Biometrics Policies and Procedures
....................................................... 225
Biometrie
Methods Assessment
...................................................,.....224
Btomctric Security and Business Ethics.
................................................... 224
Biometrie
information Security
Management
System
....................................... 225
Biometrie
ÍSMS
Standard
.......................................................... 225
xii
Table
of Contents
Biometrie
Policy
................................................................. 226
Biometrie
Practices
............................................................... 226
Biometrie
ISMS Control Objectives
................................................... 227
Biometrie
Identity Management
......................................................... 228
BIM
System Features and Functions
................................................... 229
Identity Registration
.............................................................. 230
Identity Storage
................................................................. 231
Identity Assurance
............................................................... 231
Identity Protection
............................................................... 232
Identity Issuance
................................................................. 233
Identity Life Cycle Management
..................................................... 233
System Management
.............................................................. 234
Governance
....................................................................... 234
Security Guidelines
............................................................... 235
Enrollment, Administration, and System Use Risks
........................................ 236
Impostor Trial and Error
.......................................................... 236
Noise and Power Loss Risks
........................................................ 236
Power and Timing Analysis Risks
.................................................... 236
Residual Characteristic Risk
........................................................ 237
Similar Template and Characteristics Risk
.............................................. 237
Spoofing and Mimicry Attacks
...................................................... 237
Fake Template Risks on the Server Side
................................................ 237
Communication Links Risks
........................................................ 238
Cross-System Risk
............................................................... 238
Component Alteration Risks
........................................................ 238
Electronic Access Control
.............................................................238
Access Control System Operation
.................................................... 238
Access Control System Components
................................................... 239
Five Steps to Improve Cyber Security
.....................................................239
1.
Coadect a Risk Assessment
....................................................... 239
2.
Edacate Employees
............................................................. 240
3.
Back Up Critical Information
..................................................... 240
4.
Create a Contingency Plan
....................................................... 240
5.
Sign a Security Agreement
........................................................ 240
Privacy Concerns
...................................................................241
Understanding tke Issues
...........................,............................... 241
Physical Privacy
................................................................. 242
Religious Objections
.............................................................. 242
Privacy Enhancement
............................................................. 243
Federai
Інїогяавоп
Security Management Act
..............................................243
Committee on National Security Systems
..................................................244
Summary
.........................................................................244
Key
Tenus
........................................................................245
Review Questions
..................................................,................246
Dîscassïoa
Exercises
.................................................................247
Hanđs-Oa
Projects
.................................................................. 247
CHAPTER
8
Security and Access
Tedinologîes
...................................................
24S
Introduction.
......................................................................250
AeAentkatton and Access Coated Mechanisms
.............................................250
Table of Contents
xiii
Authentication
.................................................................. 251
Software
.........................................................................251
Facelt®
....................................................................... 252
Hardware
........................................................................252
Computer Hardware Devices
........................................................ 252
Physical Security Devices
........................................................... 253
Identity-Enabled Devices
........................................................... 255
Security Elements and Components
......................................................256
Computer and Network Resource Access Control
............................................256
Identification
................................................................... 256
Authentication
.................................................................. 257
Passwords
..................................................................... 257
Authorization
................................................................... 258
Privileges and Roles
.................................................................260
Anonymous Access
............................................................... 261
Digital Certificates and Signatures
.......................................................261
Certificates and Certification Systems
.....................................................262
Access Control
.....................................................................262
Data Security and Encryption
..........................................................264
Hash
Fanerions
................................................................. 264
Asymmetric and Symmetric Encryption
................................................ 264
Pattern Recognition
.............................................................. 265
Access Control of Digital Assets and Resources
.............................................265
Techniques for Theft Prevention
..................................................... 266
Guard Solution
................................................................. 267
Lock Solution
.................................................................. 267
Electronic Solution
............................................................... 267
Biometrie
Access Control
............................................................. 268
Embedded
Biometrie
Devices
........................................................ 268
Success Factors and Design Challenges
................................................. 26$
Role of Biometrics in Physical Access Control
............................................ 270
The Benefits of Biometrics in Access Control
............................................ 27,1
Integration Tailored to the Application and Organization Served
.............................. 271
Stand-Alone Systems
.............................................................. 272
Networked Systems
.............................................................. 272
Smart Card Systems
.............................................................. 272
Third-Party System Integration
...................................................... 273
Typical Device/Systems Process Flow
273
ïssaes
to Consider
..................................................................
276
Proven
Biometrie
Technologies
.........................................................
277
Hand Geometry
................................................................. 277
Fingerprint
..................................................................... 277
Facial Systems
..................................................................
2~$
Eye
........................................................................... 278
Considerations for Access
Centről
Systems
..............................................
2 8
Summary
.........................................................................279
Key
Tenus
.................................................____....................279
Review
Questions
.....................................·..............................281
Discussi«
Exercises
................................................................. 282
Hands-Oil Projects
.................-..............-.................................282
xlv
Table
of Contents
CHAPTER
9
System Integrity and Accessibility
.................................................. 285
Introduction
....................................................................... 286
Confidentiality and Integrity
........................................................... 286
Accessibility and Availability
........................................................... 287
Maintaining System Integrity
........................................................... 287
Security Policies
................................................................. 287
Security Threats
................................................................. 288
Securing Data Systems
............................................................ 289
Dial-Back Systems
............................................................... 290
Virtual Private
Network
........................................................... 291
Authentication Techniques
......................................................... 292
Server Security
.................................................................. 292
Intrusion Detection
............................................................... 294
Intrusion Prevention
.............................................................. 294
Securiag Mechanized Transactions
...................................................... 295
Protecting the Data and Database Asset
................................................... 295
Data and Database Integrity and Security
............................................... 296
Enterprise Threats and Vulnerabilities
.................................................... 296
Intranet Security
................................................................. 297
Extranet Security
................................................................ 298
Biometrics Verification and Identification
.................................................. 299
False Rejection Rate (FRR)
......................................................... 300
False Acceptance Rate (FAR)
........................................................ 300
Performance Measures
............................................................... 301
Smart Card
Biometrie
Access Control
.................................................... 303
Smart Card Personalization and Distribution
............................................ 303
Upgrade of Physical Access Control Systems
............................................. 304
Emergency Access Procedures
....................................................... 304
Biometrie
Authentication: What Method Works Best?
......................................... 305
fingerprint Identification
........................................................... 305
Face Recognition
................................................................ 305
Hand Geometry Biometrics
......................................................... 305
Retinal Scan
.................................................................... 305
iris Scan
...................................................................... 305
Signature
...................................................................... 306
Voice Analysis
.................................................................. 306
Future Developments for Biometrics Data Integrity Assurance
................................... 306
Biometrics-Based Information Assurance
............................................... 307
Biometrie
Security Issues
.............................................................. 307
Biometrie
Encryption Issues
........................................................... 308
Biometrics-Based Assurance Protocols
................................................. 308
Ѕишшагу
......................................................................... 309
Key
Теше
........................................................................ 309
Review Questions
...........................,..............................,........
,}10
DiscassioB Exercises
.........................,.......................................
ЗЇ1
Hands-Du
Projects
..................................................................
3Í2
Table of Contents
xv
CHAPTER
10
Security and Privacy Issues
........................................................ 315
Introduction
.......................................................................316
Computer Security Basics
.............................................................316
Information
Security Basics
............................................................317
Security Management
............................................................. 318
Information Assurance Basics
..........................................................318
Computer Privacy Basics
..............................................................319
Financial
...................................................................... 320
Informational
................................................................... 320
Internet
....................................................................... 321
Medical
....................................................................... 321
Workplace
..................................................................... 321
Biometrie
Systems Security and Privacy
...................................................321
System Related
.....................................................................323
Human Related
....................................................................323
Identification and Verification Privacy
....................................................323
User Acceptability
..................................................................324
Biometrie
Security and Business Ethics
................................................. 325
Identity Theft and
Privacy
Issues
..................................................... 325
Major Concerns
....................................................................326
Major Privacy Concerns
..............................................................327
Surveillance
.................................................................... 328
Databases
..................................................................... 328
Linking
....................................................................... 329
Tracking
...................................................................... 329
Security Requirements Assessment
.......................................................330
Barriers to Using Biometrics
........................................................... 331
System Accuracy
................................................................ 331
System Scale
................................................................... 333
System Security
................................................................. 334
System Privacy
.................................................................. 334
Biometrics and Cryptography
..........................................................335
Combining Biometrics and Cryptography
............................................... 336
Smart Card and RHD Issues
........................................................., , 336
R.HD Privacy and Security
......................................................... 33?
Privat}
Risks lor Consumers and Enterprises
...............................,......., . . . , 33
Smart Card Alliance
.............................................................. 338
Biometrie
Security and Privacy Management
............................................. 341)
ISO
17799
Security Domains
....................................................... 34!
Summary
.........................................................................341
Key Terms
........................................................................342
Review Questions
...................................................................342
Discassion Exercises
................................................................. 344
Haađs~Gn
Projects
..................................................................344
xwl Table
of Contents
CHAPTER
11
implementation and Operation issues
............................................... 347
Introduction
.......................................................................348
Legacy System Implementations
.........................................................348
Computer Implementation Models
.................................................... 349
Implementation Project
............................................................ 350
Baseline Development
............................................................. 350
Training Program
................................................................ 350
Security Evaluation
..................................................................351
Security Cost Justification
............................................................. 352
Security Providers
................................................................ 352
Security Implementation Issues
.........................................................352
Network and E-Commerce Fraud Issues
...................................................353
Biometrie
Systems Implementations
......................................................354
Security and Privacy Issues
......................................................... 354
System Deployment Issues
............................................................. 355
Major Operation Issues
........................................................... 355
Hurdles to Clear
................................................................ 356
Weighing the Options
............................................................. 357
Performance and Reliability
........................................................ 357
Finger Imaging and Fraud Reduction
.................................................. 358
Sociological Concerns
............................................................. 359
Performance Evaluations
..............................................................359
An Introduction to Evaluating
Biometrie
Systems
......................................... 360
Performance Statistics
................................................................361
Evaluation Protocols
.................................................................361
Technolog)
Evaluation
............................................................ 362
Scenario and Operational
.......................................................... 362
Fingerprint Recognition
........................................................... 363
Face Recognition
................................................................ 363
Voice Recognition
............................................................... 364
Statistics and
Graphics
Reports
.........................................................365
Managing
Biometrie Data.......................................................... 366
Response Time and Throughput
........................................................367
International
Łnpiemeatations
..........................................................368
Kiosk Issues
.................................................................... 368
Physical Security Controls
............................................................. 369
Network Access
................................................................. 370
Media Access.
................................................................... 370
Physical Device Security
........................................................... 371
Physical Access Security
........................................................... 372
Personnel Security
............................................................... 372
Cestomer Security
............................................................... 372
Disaster Recovery
Planning
............................................................373
Easiness Impact Analysis
...................,....................................... 373
Risk Analysis
.......................................,........................... 374
Service
Levei
Agreement»..........................................................
374
Netwerk
АЉвшмгаиов
.............
,
................................................374
Sdentile
Testing of
Biometrie
ID Systems
.................................................375
Ѕшѕдаагу
.........................................................................376
Table
of Contents
xvii
Key Terms
........................................................................376
Review Questions
...................................................................378
Discussion Exercises
.................................................................379
Hands-On Projects
..................................................................380
CHAPTER
12
Standards and Legal Environment
.................................................. 383
Introduction
.......................................................................384
Standards and Practices
..............................................................384
Federal Information Processing Standard
............................................... 384
Standards Organizations
.............................................................. 385
American National Standards Institute
................................................. 385
International Organization for Standardization
........................................... 385
National Institute of Standards and Technology
.......................................... 385
International Electro/technical Commission
.............................................. 386
Semiconductor Industry Association
................................................... 386
European Telecommunications Standards Institute
........................................ 386
National Security Agency
.......................................................... 386
Smart Card Standards and Interoperability
.................................................386
Government Smart Card Interagency Advisory Board
...................................... 387
Standards
........................................................................387
Security Standards
.................................................................. 388
ISO
17799..................................................................... 389
ISO/IEC
27001................................................................. 389
Private Communication Technology
................................................... 390
Secure Sockets Layer
............................................................. 390
Pretty Good Privacy
.............................................................. 391
Secure Hypertext Transfer Protocol
................................................... 393
Secure Electronic Transaction
....................................................... 393
Trusted Computer System Evaluation Criteria/Orange Book
................................. 394
The Orange Book
................................................................ 394
Trusted Network Interpretation/Red Book
.............................................. 396
Information Technology Security Evaluation Criteria
....................................... 397
Common Criteria
................................................................ 397
Common Data Security Architecture
.................................................. 39
S
Payment Card Industry Payment Standard
.............................................. 398
Biometrie
Standards
.................................................................399
Public Key Infrastructure
.......................................................... 400
Legał
Issues and Acts
................................................................401
Employer Legal Responsibilities
...................................................... 401
Current
Biometrie
Initiatives
...........................................................40
1
Terrorism, Immigration, and Border Security
............................................ 402
Other Identification Initiatives
....................................................... 402
Engiaeering/Spedficatioas
............................................................. 403
Computer and Network Specifications
................................................. 403
Biometrie
Fingerprint Specifications
...................................................
403
Biometrie
Element and System Specifications
............................................ 404
Card-Related Specifications
......................................................... 404
Biometrie
Measurements
...............................................................405
Evaluation
Programs
................................................................
4Ö6
xviii
Table
of
Contents
Technology
.......................................................................407
Common
Biometrie
Exchange File Format
.............................................. 407
Professional Organizations
............................................................ 409
International
Biometrie
Industry Association
............................................. 409
Biometrie
Consortium
............................................................. 409
Kational Biometrie
Security Project
................................................... 410
Additional
Biometrie
Player Organizations
.............................................. 410
Summary
.........................................................................411
Key Terms
........................................................................412
Review Questions
...................................................................413
Discussion
Exercises
.................................................................414
Hands-On Projects
..................................................................414
APPENDiX
Biometrics Vendors
............................................................. 416
GLOSSARY
............................................................... 422
END NOTES
.............................................................. 435
INDEX
.................................................................. 438
|
any_adam_object | 1 |
author | Newman, Robert |
author_facet | Newman, Robert |
author_role | aut |
author_sort | Newman, Robert |
author_variant | r n rn |
building | Verbundindex |
bvnumber | BV035945873 |
classification_rvk | ST 177 |
ctrlnum | (OCoLC)635347537 (DE-599)BVBBV035945873 |
discipline | Informatik |
edition | Internat. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01677nam a2200445 c 4500</leader><controlfield tag="001">BV035945873</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100908 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100111s2010 |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA997996</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781435496675</subfield><subfield code="c">pbk</subfield><subfield code="9">978-1-4354-9667-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1435496671</subfield><subfield code="c">pbk</subfield><subfield code="9">1-4354-9667-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)635347537</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV035945873</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 177</subfield><subfield code="0">(DE-625)143604:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Newman, Robert</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and access control using biometric technologies</subfield><subfield code="c">Robert Newman</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Internat. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, Mass.</subfield><subfield code="b">Course Technology</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 456 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometric identification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Biometric identification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Biometrie</subfield><subfield code="0">(DE-588)4124925-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018803023&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018803023</subfield></datafield></record></collection> |
id | DE-604.BV035945873 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T22:07:53Z |
institution | BVB |
isbn | 9781435496675 1435496671 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018803023 |
oclc_num | 635347537 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-355 DE-BY-UBR |
physical | XXIV, 456 S. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Course Technology |
record_format | marc |
spelling | Newman, Robert Verfasser aut Security and access control using biometric technologies Robert Newman Internat. ed. Boston, Mass. Course Technology 2010 XXIV, 456 S. txt rdacontent n rdamedia nc rdacarrier Biometric identification Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Biometrie (DE-588)4124925-2 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Biometrie (DE-588)4124925-2 s Computersicherheit (DE-588)4274324-2 s Zugriffskontrolle (DE-588)4293034-0 s DE-604 Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018803023&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Newman, Robert Security and access control using biometric technologies Biometric identification Computer security Computersicherheit (DE-588)4274324-2 gnd Biometrie (DE-588)4124925-2 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4124925-2 (DE-588)4293034-0 |
title | Security and access control using biometric technologies |
title_auth | Security and access control using biometric technologies |
title_exact_search | Security and access control using biometric technologies |
title_full | Security and access control using biometric technologies Robert Newman |
title_fullStr | Security and access control using biometric technologies Robert Newman |
title_full_unstemmed | Security and access control using biometric technologies Robert Newman |
title_short | Security and access control using biometric technologies |
title_sort | security and access control using biometric technologies |
topic | Biometric identification Computer security Computersicherheit (DE-588)4274324-2 gnd Biometrie (DE-588)4124925-2 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
topic_facet | Biometric identification Computer security Computersicherheit Biometrie Zugriffskontrolle |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018803023&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT newmanrobert securityandaccesscontrolusingbiometrictechnologies |