This preview shows page 1. Sign up to view the full content.
Unformatted text preview: system A bank clerk modifies the financial records and later claims that her biometric data was stolen and denies that she is responsible Contamination (covert acquisition): An attacker illegally obtains biometric data of genuine users and uses it to access the system Lifting a latent fingerprint and constructing a synthetic finger...
View Full Document
This document was uploaded on 11/03/2011 for the course BIOLOGY BSC1105 at Broward College.
- Fall '10