Академический Документы
Профессиональный Документы
Культура Документы
Presented by
Ratna Sudha.R
CONTENTS
1. Introduction
2. Security and authentication
3. Methods of verification
a. Psychological verification
i. Finger Print.
ii. Hand Print.
iii. Face Measurement.
iv. Retinal Scanning.
v. DNA Analysis.
b. Behavioral verification
i. Typing.
ii. Signature.
iii. Voice.
4. Identification.
5. Verification.
6. Advantages
7. Limitations
8. Conclusion.
9. References
Introduction
Biometrics is an advanced technology for superb security and
authentication .The very term "biometric” it represent that "bio" means
related to the biological study and "metric " means something, which is
related to measurement. In network environment security is a crucial factor.
Provide security to pages in the network is to difficulty. Password is not a
good measurement for security. Good security mechanism is necessary on
the Internet. Security in different levels applies to various documents.
Security is depends how security assign to documents. Security depends on
following categories.
1. Confidential
2. Secret
3. Non-secret
4. Public
1.Token-based security:
It relies on the users special item -token like card-id.
Neither of the two can accurately determine whether the password that
fraudulently obtained.
validating a user's logon for the local machine and for remote access. A
is not a secure operating system and does not support file system or registry
security.
instances can only appear in the Root\Security namespace and must remain
there permanently.
for WBEM users. It is similar to the User Manager application supplied with
two types of subjects: user and group. Users are represented by instances of
the NTLMUser system class, which describes individual users. Groups are
indirectly from the subject system class, an abstract class that is not
from the generic User class and NTLMGroup derives from the generic
Group class.
Permissions:
The SQL Server permissions system specifies which users are authorized to
Permission Hierarchy:
SA, database owners, database object owners, and other users of the
database.
System Administrator
Database owners
other users.
discussed throughout this chapter. You may find it useful to refer back to
this list of security definitions as you read through this chapter and through
alias
database alias allows you to treat more than one person as the same user
inside a database, giving all of them the same permissions. Any username in
Aliases are often used so that several users can assume the role of
database owner.
and procedures. The user who creates a database object is the database
object owner and is automatically granted all permissions on it. The database
object owner can grant permission to other users to use that object. Database
database owner
one DBO. The DBO has full privileges inside the database that he or she
owns, and determines the access and capabilities provided to other users.
domain
are grouped for viewing and administrative purposes, and that share a
users receive the database permissions granted to the group. Using groups
provide a convenient way to grant and revoke permissions to more than one
users received the Windows NT rights and permissions granted to the group.
number of users with similar needs, within the security scope of a domain or
a computer.
integrated security
login ID
Server validates a login request. There are three types of login security:
mixed security
established.
object permissions
database objects. They are granted and revoked by the owner of the object.
permissions
standard security
Standard security uses SQL Server's own login validation process for
all connections. To log in to a SQL Server, each user must provide a valid
statement permissions
DUMP TRANSACTION.
system administrator
The system administrator (SA) is the person responsible for the
SQL Server; configuring servers and clients; managing and monitoring the
use of disk space, memory, and connections; creating devices and databases;
designers about the data that already exists on SQL Server, make
and so on.
which means that SQL Server does no permission checking for the system
can log in and act as system administrator (unless the server is running in
Integrated login security mode).
trusted connections
trusted connections.
username
for the purpose of allowing a user to have access to a database. The abilities
member of.
Method of Verification
1.PSYCHOLOGICAL VERIFICATION
organs of the human being, which will have unique identification and does
I. Fingerprint.
II. Handprint.
I. Finger print: It involves the user placing his finger over a glass-plate,
Advantages:
forensic.
stored and then accessed in a database. This necessities the use of easier
other personal details to store and tie it with their fingerprint data. The next
Disadvantages:
Advantage:
Disadvantage:
a. Complex in usage.
b. Implementation is expensive.
image from a security video capture. This technique enables the computer to
use your face as your password and matching these to an existing database.
Advantage:
b. Less expensive.
Disadvantage:
movement, glass.
It involves imaging of the blood vessels in the retina of the eye when
The retinal iris patterns are unique to individuals than any biometric
yet devised.
The retina is an internal part of the eye located at the back of the eye
and is get of thin nerve which sense the light coming through a camera,
The pattern of blood vessels which makeup retina are unique to each
Advantage:
b. It s sophisticated process.
Disadvantages:
are died, to find out the relationship like identifying Childs natural parents.
Advantages:
Disadvantages:
e. DNA testing takes longer time than other methods.
2.BEHAVOURAL VERIFICATION
This involves in oral thing done by the individual. There are 3 types of
behavioral verifications,
1. Typing
2. Signature
3. Voice
1. Typing:
Some systems measure things you do in addition to the things you are,
you will notice that your typing has a certain pattern. Some letters follow
authentication without the need for any additional software. This measure is
2. Signature:
Disadvantages:
consistency with which a user makes his signature. If pressures are not tally
3. Voice:
Advantages:
1) It is inexpensive.
Disadvantages:
Some times use more than one form biometrics. This mixed form
provide more security. Here combine more than one type. Even 80% equals
Authentication:
accuracy .The system might let you pass in one attempt on Monday and
and FRR.
authentic Bio-signature.
As FRR increases, the FAR goes down and vice versa.
Advantages
catch them.
finger.
Limitations
Any time data loose in database high effect for security mechanism.
It highly expensive
Conclusion
Security is not just about putting big locks on the front door; it
also involves making sure all the windows are shut. Each one can be
individually fooled, but the comparison makes the system more secure as a
whole. Biometrics are have its own advantages and disadvantages. It high
expensive but it provide good security. Money is not important than security.
It is more useful for confidential maters.
References
http://Biometrics.com
http://whitepapers.com
http://www.milesresearch.com
http://microsoft/biometrics.com
IT Magazines