Biometric Authentication: A Case Study in Security
Table of Contents
Q NO 13
Biometric Authentication System: The Utility for MOD3
Role-Based Authentication and other Alternatives3
Passwords4
Challenge Response4
Public Key5
a) Benefits of the System: Security and Confidentiality5
b) Leading Edge Technologies: Requirement by MOD5
Technology Specifications6
Q No 27
Palm Biometrics System7
a) Strengths of Palm Biometric Systems7
Weakness of the Palm Biometrics System7
b) Reliability of the System8
Q No 38
Risks and Limitations of Template Usage,8
Security Threats9
Suitability and Inherent Dangers9
Decision Subsystem Attack10
Other Attacks10
a) Aditech Face Recognition System10
b) Feasible Alternate Technology for MOD11
c) Implementation and Utility for MOD11
Q No 412
Overview12
Security Policy for MOD12
Steria: Security Policy13
References14
Biometric Authentication: A Case Study in Security
Q NO 1
Biometric Authentication System: The Utility for MOD
This technology is utilised for the identification of persons through machine. For identification human-generated patterns are used such as contain voice, face, handwriting, fingerprint, and eye identification (James, 2001, pp. 93-113). BA refers to the collection of information about a feature of a person (his voice, fingerprint) to later be able to compare that sample with another, usually taken at the same moment, and to find out if they are equal or not.
This system is essential for the MOD as it can provide the security and the safe access to the sensitive military resources. The military always functions in a very challenging and threatening environment, where it is make sure that their secure information is transferred op reached by the appropriate personnel in an effective manner. The technology produced by Steria (Biometric Data Capture System, 2009), which can help Mod to attain the desired level of safety, and be able to enhance the communication and information dissemination process in the challenging environment of the military conflicts (Wayman et.al, 2005, pp. 1-20).
Role-Based Authentication and other Alternatives
Role Based Authentication is a system in which every user has definite roles fixed to him/her that defines the capabilities and limits of the user of making alterations, accessing a variety of regions of allotting or transferring these roles repeatedly (Ferraiolo, 2009). Strict defence measures must be remember while such a system is designed with proper decryption and encryption techniques that are used at both the ends to avoid any likelihood of any 3rd party attacks. Role based mechanism is used in biometric systems for various purposes (Choukse & Singh, 2011, p.58).
Other alternatives are also available, such as
Passwords
This is the way which is considered the most common techniques of authentication, this way works by just asking a secret password for the user and yielding access if the provided password is correct (Ortiz, 2001, p.1). This method can be used in MoD. Although, it is simple technique for authentication but this technique may be vulnerable for the reason that people often select weak passwords which are very short and may be the word of dictionary (O'Gorman, 2003, pp. 2021-2040), this make it inclined to brute-force attacks.
Challenge Response
This technique uses passwords, however in this technique password is certainly not sent. Instead, authentication centre forwards a random figure to the client or user. The user after that responds by merging the ...