StudentShare solutions
Triangle menu

Computer Physical Security - Essay Example

Not dowloaded yet

Extract of sample
Computer Physical Security

Biometric characteristics are exclusively individual; therefore making such characteristics a basis of user identification provides high reliability of protection. So we may define a biometric system as 'a pattern recognition system which recognizes a user by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user'2.
The tests made by the International Computer Security Association (ICSA) have allowed to issue certificates to rather limited number of systems of biometric identification. It is necessary to notice that six products certificated by the ICSA have been selected as a result of the careful analysis from a plenty of models. In the manual 'Biometric Industry Product Guide' issued by the ICSA, there is a description of 170 systems, allowing to make identification of users on basis of their unique physical parameters. Many independent users, including representatives of the ICSA, appreciate certified systems at their true value.
The majority of biometric systems operate in the following way: the digital mark of a fingerprint, an iris or a voice is stored in the system database. A person, who is going to get access to a computer network, enters his/her own personal biometric information into the system by means of a microphone, a scanner of finger-prints or other devices. The received data are compared with the sample, which is kept in the database. Let us consider the mostly used biometric systems of computes access control.
FINGERPRINT RECOGNITION
Recently the dactyloscopy has attracted the attention as a biometric parameter, which quite possibly will become the most popular in the future. Already now the application of this technology has received wide circulation in Automated Fingerprint Identification System (AFIS) used by police throughout all territory of the USA and more than in other 30 countries of the world. In the USA devices of access control based on fingerprint identification are established in military institution, including the Pentagon. Among the advantages of fingerprint scanners are simplicity, usability and reliability. Though the percent of erroneous negative identification is about 3 %, a mistake of positive access is less than one to one million. All process of identification lasts no more than several seconds and does not demand any efforts from those, who use the given system of access. Nowadays such systems are made in the size of less than a pack of cards. The certain disadvantage constraining the development of the given method is the bias of a part of people, which do not wish to make the information on their fingerprints available. Thus the counterargument of developers of such equipment is the assurance that the information about papillate pattern of a finger is not stored. What is stored is only short identification code constructed on the basis of prominent features of your finger-print.
HAND GEOMETRY RECOGNITION
The method of identification of users by hand geometry by it's the technological structure and the level of reliability is quite comparable to the method of ident ...Show more

Summary

Recently the developers of systems for computer networks protection are more and more guided by the biometric systems. 'Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentification purposes'1…
Author : rhiannon77
Computer Physical Security essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Computer Physical Security"
with a personal 20% discount.
Grab the best paper

Related Essays

Computer Security
He plans to do it single handedly within 9 days. Security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files. Also it is assumed the AES encryption method deployed by Alice is secure enough to restrict unauthorized access to the encrypted file as well as the fact that the password used is strong enough to warrant random guess (Eran Tromer, 2008).
8 pages (2000 words) Essay
Computer Security
Computer networking has been developed over the years and this has brought many advantages in the today's business society. With computer networks, it is possible to share resources and information. Information can be stored in a common location and this location be put in a network where everyone who can access the network will have the chance to access it and therefore save them the trouble of having to look for that information and carry it using external storage devices.
4 pages (1000 words) Essay
Computer Security
As the severity of cyber threats become increasingly more sophisticated because of the alternating reasons behind hacking, so are the set strategies to aid in combating them. Current techniques to provide digital security are executed with a woefully inadequate strategy, considering a frighteningly short time horizon.
30 pages (7500 words) Essay
Attacking Cryptography Computer Security
The challenge with the data protection methods is that when two or more application programs are being executed concurrently, they share common resources such as the processor and the internal memory (Nedjah & Mourelle, 2005). As information shares the channels of transfer, there is a possibility of one program gaining access to the information in another program whether they have been encrypted or not (Yoshiura, 2006).
6 pages (1500 words) Essay
Computer Security
Both of the studies featured in this essay are similar in the sense that these studies are aimed towards enhancing computer security in organizations. However, the studies differ in the study goals and scope, methodology and analysis. The importance of computer security has been emphasized by two expert studies.
9 pages (2250 words) Essay
Physical Security Principles
With the advent of new IT enabled security technologies, the ancient physical security products are becoming irrelevant. The physical security market in US alone is more than $120 billion alone and with the changing global living ways the market is expected to grow 8 percent annually by the year 2010.
5 pages (1250 words) Essay
Computer system Network Security
Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network
5 pages (1250 words) Essay
Computer Security Policies
and two offsite locations; one in Reston, VA and Annapolis, MD. Our main office boasts of 15 full time staff experienced in all aspects of ICT whether technical or business processes. The staff also comprise of 3 IT engineers, 2 software
4 pages (1000 words) Essay
Physical Security Principles Paper
locking the houses, employing security personnel to guard ground, building, factories and other governmental or commercial establishments and surveillance. With the advent of new IT enabled security technologies, the ancient physical security products are becoming
5 pages (1250 words) Essay
Information Security Physical Security models
Physical security embodies the foundation of any security model. If an intruder happens to breach the physical security of an institution, he will have access to all other security elements. A security model, on the other hand, is
3 pages (750 words) Essay
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation