Section 1
Introduction:
User Authentication plays the key role for the users to make use of the resources available in any given Environment. With the advancements in technology, it has become quite easy for a person to find out ways to access the data of the other person. It is very important to verify the true identity of the person trying to access his/her data. The concerned organization or the business group has to make sure that the person trying to access is the right user of the data and care must be taken in such a way that the resources are not used for the wrong purposes. Making use of the correct resources by the right person in a right way is the purpose behind the authentication. A customer is mainly concerned
…show more content…
Whereas CBAT, a hardware based solution is the technology which is implemented in the user’s system, and it tries to evaluate the user by executing the logic implemented. The purpose of this survey is to highlight the various authentication methods with their advantages and disadvantages and to provide awareness to the individuals, so that suitable authentication method can be used in the correct scenario.
Section 2
The Biometric Feature authentication is the simplest method that analyzes the way the user types at the terminal by monitoring the keyboard inputs and identifies the users based on the habitual typing rhythm patterns. The core idea behind this approach is that the biometric features are unique to an individual and they cannot be imitated by any other person and they are unchangeable. The feature used is Typing Biometrics. After the user types the target string password, Four features (key code, two keystroke latencies, and key duration) were analyzed, combined and compared against the default samples which are already present in the adaptive mechanism template of the system, thereby authenticating the correct user. The advantage of this approach is its low cost, but it is limited to very few numbers of users and the main disadvantage is that this method is not effective if the length of the password is less than ten.
Gesture based and Lip feature based Representation approaches does
Identification is the means through which a user is associated with and gains access to an account. The most common form of identification in use with computer systems is through the use of a username. Other systems use Common Access Cards (CAC), smart cards, or tokens combined with a pin code that allow for access to a system. More complex, high security systems might use some form of biometric to associate a user with an account and permission set. Biometrics include: fingerprint, iris scan, facial scan etc.. something that is unique to the particular person that cannot be easily altered. Identification allows for the tracking
The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.
Portable equipment often doesn't need passwords enabled. Mobile device apparatuses often need passwords on validating clients and control entry should information saved on the gadgets. a large number unit have those specialized foul abilities should backing passwords, particular ID number numbers (PIN), or design screen bolts to Confirmation. Some versatile apparatuses likewise incorporate a biometric spectator to examine a finger impression to verification. However, ane data demonstrates that shoppers sometimes utilize these instruments. Additionally, if clients would utilization A secret key alternately PIN they often decide passwords alternately PINs that camwood make effortlessly decided alternately bypassed, for example, 1234 or 0000.
The User ID and Password will be provided to the user once the user completes the
Authentication of an individual to access and use files, systems, and screens is vital to
The consumer expects that when using a public computer for a specified task such as printing through a service, that the data or material is protected from other users including employees. When using a public computer for internet surfing, tax filing banking, etc. the general public user does not always think about the threats to security of their own personal information. It is important for the company to protect the users in addition to the users understanding the potential threats that exist when entering personal information.
Biometrics is a method of identifying an individual based on characteristics that they possess, typically physiological features such as a fingerprint, hand, iris, retina, face, voice, and even DNA. Some methods of biometrics security even use multiple physiological features or multimodal biometrics to provide superior security than a single form of biometrics can provide. Why are biometrics important in the field of information security? Biometrics provide a remarkable amount of security for information because biometrics are unique to each person, and thus cannot be lost, copied, or shared with another individual. This security allows for biometrics to provide a means to reliability authenticate personnel. The importance of biometrics can be further divided into the history of biometrics and why it was devised, past implementations of biometrics, current implementations of biometrics, and future implementations of biometrics.
Identification processes are significantly more complex and error prone than verification processes. Biometrics technologies are indicators of authentication assurance with results based on a predetermined threshold with measurable False Accept Rates and False Reject Rates.
The client by clicking on the word here, where he/she became a legitimate client of the enterprise network. But even though this, the client needs additional authentication for the purpose of access to existing applications on the network server. Case study application has been developed to demonstrate the access of the client to the enterprise application with addition to the security
4. Which of the following components can be used to measure the confidence in any authentication system?
Therefore, it is important to include a number of important contextual factors such that when one occurs, an alert may be sent to an assigned security officer, or request that further authentication information be required from the user. It is also important to associate user authentication with a "risk score" based on a number of context factors that can determine the level of risk associated with the authentication method in use (CA Technologies, 2011). Based on the risk score, authentication may either be approved or declined, or the user may be prompted for additional authentication information.
4. Which of the following components can be used to measure the confidence in any authentication system?
Biometric technology offers an alternative to the most used system currently in place in most operations: passwords or personal identification numbers (PIN). Instead of users inputting their password or PIN, users interact with a computer terminal that will scan their finger, face, voice, retina, etc. to identify them. Many of the next generation personal computer systems will have integrated biometric technology so that no external hardware is needed. In the mean time, users can buy small peripherals, like a mouse with integrated biometric technology or a small finger terminal for finger scans, to secure their personal computers.
Authentication is the only method which protects information or data of an individual or organization from a second party to access. Based upon the confidentiality of that particular data or information, the level of authentication depends. Now-a-days, all this data and information what we are talking about is getting digitized all around the world. For this digitized data or information to be secure, a proper authentication procedure must be set. This arise the need for an authentication secret which belongs to the category “Something we know” to come into picture. These secrets authenticate each secret holder as the authorized legitimate user to access their particular account. Technology is
Biometric technologies are getting better and finely tuned. The rate of false readings and errors has sharply fallen. However it still requires careful consideration and planning to implement a biometric identification system. They are most costly and complicated to implement as compared with other authentication systems. A proper evaluation of the system is important before purchasing any biometric system. A thorough risk analysis is necessary. In many cases biometrics may be overkill. Biometrics must be used if there is high level of risk involved. Customer acceptance is also important when logging on to company websites. Home users might not be ready to install biometrics on home computers for online banking.