Circumvention - system A bank clerk modifies the financial...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
Circumvention: An attacker gains access to the  system protected by biometric authentication  •Privacy attack:Attacker accesses the data that she was  not authorized (e.g., accessing the medical records of  another user) •Subversive attack:Attacker manipulates the system (e.g.,  submitting bogus insurance claims) •Repudiation: An attacker denies accessing the 
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: system A bank clerk modifies the financial records and later claims that her biometric data was stolen and denies that she is responsible Contamination (covert acquisition): An attacker illegally obtains biometric data of genuine users and uses it to access the system Lifting a latent fingerprint and constructing a synthetic finger...
View Full Document

This document was uploaded on 11/03/2011 for the course BIOLOGY BSC1105 at Broward College.

Ask a homework question - tutors are online