Biometric Authentication

Read Complete Research Material

BIOMETRIC AUTHENTICATION

Biometric Authentication: A Case Study in Security

Table of Contents

Q NO 13

Biometric Authentication System: The Utility for MOD3

Role-Based Authentication and other Alternatives3

Passwords4

Challenge Response4

Public Key5

a) Benefits of the System: Security and Confidentiality5

b) Leading Edge Technologies: Requirement by MOD5

Technology Specifications6

Q No 27

Palm Biometrics System7

a) Strengths of Palm Biometric Systems7

Weakness of the Palm Biometrics System7

b) Reliability of the System8

Q No 38

Risks and Limitations of Template Usage,8

Security Threats9

Suitability and Inherent Dangers9

Decision Subsystem Attack10

Other Attacks10

a) Aditech Face Recognition System10

b) Feasible Alternate Technology for MOD11

c) Implementation and Utility for MOD11

Q No 412

Overview12

Security Policy for MOD12

Steria: Security Policy13

References14

Biometric Authentication: A Case Study in Security

Q NO 1

Biometric Authentication System: The Utility for MOD

This technology is utilised for the identification of persons through machine. For identification human-generated patterns are used such as contain voice, face, handwriting, fingerprint, and eye identification (James, 2001, pp. 93-113). BA refers to the collection of information about a feature of a person (his voice, fingerprint) to later be able to compare that sample with another, usually taken at the same moment, and to find out if they are equal or not.

This system is essential for the MOD as it can provide the security and the safe access to the sensitive military resources. The military always functions in a very challenging and threatening environment, where it is make sure that their secure information is transferred op reached by the appropriate personnel in an effective manner. The technology produced by Steria (Biometric Data Capture System, 2009), which can help Mod to attain the desired level of safety, and be able to enhance the communication and information dissemination process in the challenging environment of the military conflicts (Wayman et.al, 2005, pp. 1-20).

Role-Based Authentication and other Alternatives

Role Based Authentication is a system in which every user has definite roles fixed to him/her that defines the capabilities and limits of the user of making alterations, accessing a variety of regions of allotting or transferring these roles repeatedly (Ferraiolo, 2009). Strict defence measures must be remember while such a system is designed with proper decryption and encryption techniques that are used at both the ends to avoid any likelihood of any 3rd party attacks. Role based mechanism is used in biometric systems for various purposes (Choukse & Singh, 2011, p.58).

Other alternatives are also available, such as

Passwords

This is the way which is considered the most common techniques of authentication, this way works by just asking a secret password for the user and yielding access if the provided password is correct (Ortiz, 2001, p.1). This method can be used in MoD. Although, it is simple technique for authentication but this technique may be vulnerable for the reason that people often select weak passwords which are very short and may be the word of dictionary (O'Gorman, 2003, pp. 2021-2040), this make it inclined to brute-force attacks.

Challenge Response

This technique uses passwords, however in this technique password is certainly not sent. Instead, authentication centre forwards a random figure to the client or user. The user after that responds by merging the ...
Related Ads