This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas TECH 7350 MANAGING INFORMATION MANAGING INFORMATION SECURITY SECURITY Sandra Blanke, Ph.D., CISSP The Graduate School of Management at the University of Dallas Unit 3 Chapter 4 Biometrics Unit 3 Chapter 4 Biometrics Part 2 of 5 Part 2 of 5 2 Learning Objectives Biometrics Password & Password Management Layering in Security Asynchronous and Synchronous Access Devices Issues with Token Devices 3 Biometrics for Authentication Unique Personal Attribute Palm Finger Retinas Iris Biometrics Errors Type I Error Rejects an authorized individual Type II Error Accepts an imposter TECH 7350 Managing Information Security The Graduate School of Management at the University of Dallas 4 More about Biometrics Signature Dynamics Signing a signature physical motion produces electrical signals that can be captured by a biometric system Signing Digitized Signature Electronic copy of someones signature it is not a biometric system...
View Full Document
This note was uploaded on 02/20/2011 for the course TECH 7350 taught by Professor Lee during the Spring '11 term at University of Arkansas for Medical Sciences.
- Spring '11