Unit2 CNS 2020
Unit2 CNS 2020
2.1.2 Piggybacking
In the context of computer science, "piggybacking" refers to a situation where an unauthorized
party gains access to some system in connection with an authorized party. This can happen in
several ways, including piggybacking on public wireless networks, and piggybacking into a
password-protected system.
2.2 People as Security Tool: Security awareness and Individual user responsibilities:
• [Access control authentication devices include id and password, digital certificates, security
tokens, smart cards and biometrics.
• Access control authorization means role based access control ( RBAC).
• Mandatory access control is access control policies that are determined by the system and not
the application or information owner.
• RBAC is commonly found in government, military and other enterprises where the role
definitions are well defined.]
2.3.3 Biometric
1. Finger Print
• Fingerprints are used in forensic science and in various areas for identification for long
time. Fingerprints of each individual are unique.
• Fingerprint Biometric Systems examine the unique characteristics of your fingerprints
and use that information to determine whether or not you should be allowed access.
• Smart phones also have sensors to capture our fingerprints and thus guarantee that we
are the only people who can unlock our phones.
• The user’s finger is placed on the scanner surface. Light flashes inside the machine, and
the reflection is captured by a scanner, and it is used for analysis and then verified
against the original specimen stored in the system. Advantages:
• Implementation costs are low
• This technology has good user acceptance.
• High performance
Disadvantages:
• It can make mistake with the dryness or dirty of the finger’s skin.
• High chances of finger image degradation by age.
• Can be of chances of fake fingerprints.
Applications(usage):
• Access control
• Forensic science • ATM
• Border enforcement agency
• Checkout at retail etc…
2. Voice Pattern
• Voice biometric authentication is the use of the voice pattern to verify the identity of the
individual. It is fast becoming a widely deployed form of biometric authentication.
(Adv.)
• Voice biometrics works by digitizing a profile of a person's speech to produce a stored
model voice print, or template.
• Biometric technology reduces each spoken word to segments composed of several
dominant frequencies called formants. Each segment has several tones that can be
captured in a digital format. The tones collectively identify the speaker's unique voice
print. Voice prints are stored in databases in a manner similar to the storing of
fingerprints or other biometric data.
• Disadvantage: A person's speech is subject to change depending on health and emotional
state. Matching a voice print requires that the person speak in the normal voice that was
used when the template was created at enrollment.
• If the person suffers from a physical ailment, such as a cold, or is unusually excited or
depressed, the voice sample submitted may be different from the template and will not
match.
• Other factors also affect voice recognition results. Background noise and the quality of
the input device (the microphone) can create additional challenges for voice recognition
systems.
• If authentication is being attempted remotely over the telephone, the use of a cell phone
instead of a landline can affect the accuracy of the results.
• Voice recognition systems may be vulnerable to replay attacks: if someone records the
authorized user's phrase and replays it, that person may acquire the user's privileges.
Disadvantages:
• The shape of the hand may be changed due to illness, age or change in weight.
Applications(usage):
• Access control
• Immigration control
1) Piggybacking
2) Biometrics