Biometrics and Network Security
Biometrics can be a growing technology that will almost certainly be seen used on network protection in the near future. 3 options are discussed with this paper; keystroke dynamics, fingerprint scanning, and iris scanning. Every option offers its strengths and weaknesses but none of them are a standalone way to access a network. Will need to any of these alternatives be applied they will need to be put together with password or perhaps token security measures which might be currently in position. Keywords: biometrics, keystroke dynamics, fingerprint, eye scan
Biometrics and Technology
This newspaper will discuss current and future biometrics capabilities and just how those capabilities may be put on information technology (IT) security, most of all how the U. S. army can combine biometrics into their network reliability framework. Just about all major companies as well as the U. S. government are looking to, and have already included biometrics within their layered THAT security. Biometrics, coupled with account details and tokens can significantly increase network security, nevertheless , biometrics alone at their very own current capabilities are more vunerable to security removes than passwords alone. Qualifications
CNN recently reported that we now have over sixty, 000 cyber-attacks occurring each day on military networks and effective reliability measures are continually getting sought to guard information by those that might use it to accomplish the nation damage. In the past 8 years the military offers incrementally increased user level security measures to protect this kind of vital information. In the year 2003 a armed forces computer user could just log on to the network by using a relatively brief password associated with their customer name. As security concerns began to boost those password length and symbol requirements became more stringent. Right now the armed forces exclusively utilizes a token program to access armed service networks in the form of a common access card (CAC) with intelligent chip technology paired with an individual identification quantity (PIN). Simply eight in years past military network users had been required to examine and signal a hard duplicate computer customer agreement to reach the network. Presently users are required to undergo annual computer user teaching as well as indication an annual computer system user contract, and every period a user logs on, they are really required to accept the governments' computer usage policy. The U. T. Army has become using biometrics in the functional environment for at least the past a decade to track insurgents in War and Afghanistan, but they possess yet to implement these types of biometric equipment to increase network security at the user level, however , the Army happens to be looking to field portable electronics to Troops deployed to enhance the transportability and usability of these biometric applications (Horn, 2011). For that reason increased involvement in the use of Biometrics, it will probably be only a matter of time before biometric equipment are implemented for consumer level network security access. Some of the possible solutions that are to be developed utilizing biometrics happen to be keystroke mechanics, fingerprinting, and iris or retinal scanning services to further reinforce passwords and tokens. Keystroke Dynamics
The standard thoughts on computer system security are you can authenticate with something you know (passwords), something you have (tokens), or something you are (biometrics), but this section will go over the possibility of authentication by how you enter the username and password or expression. This " howвЂќ is key stroke mechanics. The theory of key stroke dynamics is usually founded on the assumption that the person's typing behavior is a result of physical features that are exclusive to a particular individual and so can be used for authentication. This uniqueness is definitely not unlike the more recognized biometric applications of fingerprinting, speech recognition or the eye scan (Douhou, 2009).
The concept of keystroke aspect in not only a new thought, in World...
Sources: Douhou, T., & Magnus, J. Ur. (2010). The reliability of user authentication through keystroke dynamics. Statistica Neerlandica, Nov2009, Vol. 63 Issue 4. Retrieved by EBSCOHOST
365 Computer Reliability Training. (2010). What is Biometric Fingerprint Scanning. Retrieved by http://www.computer-network-security-training.com/what-is-biometric-fingerprint-scanning/
Daily Mail. (2011). Log-in to Facebook with an iris scan: Eye-scanner for your PC set to embark on the market in months. Retrieved from http://www.dailymail.co.uk/sciencetech/article-1385959/Under-look-key-PC-iris-scanner-security-device-set-market-months.html