Book Image

Identity Management with Biometrics

By : Lisa Bock
Book Image

Identity Management with Biometrics

By: Lisa Bock

Overview of this book

Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition. Starting with an overview of biometrics, you’ll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You’ll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You’ll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies. By the end of this book, you’ll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies.
Table of Contents (20 chapters)
1
Section 1 –Understanding Biometric Authentication
6
Section 2 – Applying Biometric Technologies
12
Section 3 – Deploying a Large-Scale Biometric System

Questions

Now it's time to check your knowledge. Select the best response, and then check your answers, found in the Assessment section at the end of the book:

  1. _____ recognition can work without the subject having any knowledge they are being observed, so this type of identification can be used for threat management.

    a. Voice

    b. Retinal

    c. Facial

    d. Cloud

  2. If you need to implement a system in a remote office with a limited network, you'll need to use a _____ system.

    a. standalone

    b. cloud

    c. networked

    d. scanning

  3. When installing a biometric system, in order to maintain the biometric workflow, there may be a need to use a _____ product so that the proprietary system can talk to the backend.

    a. malware

    b. cloudware

    c. scan-box

    d. middleware

  4. A(n) ___ is a Type 1 error.

    a. FMR

    b. FNMR

    c. FTE

    d. CER

  5. Adding a second biometric identifier, either as a required second authenticator, or as an alternative to another biometric, is called ____ biometric authentication.

    a. far...