B063: 2014 TechMed Pre-release Chapter 8 Revision

HideShow resource information
What are biometrics?
Biometrics is the recognition of an individual by a unique physiological or behavioural characteristic.
1 of 19
What can biometrics be used for?
To control the access to either a computer system or a location.
2 of 19
What are the biometrics indicators usually based on?
Physiological characteristics such as fingerprint recognition, palm print recognition, facial recognition, iris or retina recognisiton and DNA.
3 of 19
How does palm print recognition operate?
The user keys in their number using the keyboard then place their palm on the pad. The computer checks the number and palm against a stored copy. If it okay, access is granted. If not, it remains locked.
4 of 19
What does a user do to work fingerprint recognition?
They put their index finger on the reader sensor. The computer system automatically permits access where there is a match between the fingerprint and the stored fingerprint image. The user does not need to enter an identify number.
5 of 19
What does a user do to work an iris scanner?
They have to look directly at a camera. It will input an image of the iris and match it up with images of the iris on the system. Facial recognition works in the same way.
6 of 19
What is speaker recognition?
This biometric reader is for behavioural characteristics such as speaker recognition or typing rhythm. Speaker recognition is where the speaker is identified by a voice pattern. This identifies who is speaking, not any command which might be said.
7 of 19
What is the biometric security process?
Capture and store new biometric data for new users. Capture user's biometric data as access accepted. Then check whether the data matches. If it does, allow them access. If not, refuse them access.
8 of 19
What are some advantages to using biometrics?
The biometric method is unique to the individual user so is more reliable than traditional access control methods. They cannot be lost by the user and they don't have to remember anything. Mobile devices as an input device for facial recognition.
9 of 19
What are some disadvantages to using biometrics?
Users are concerned for their privacy with the use of biometric characteristics. Biometric readers are not always reliable. Sometimes there is false acception or rejection of a person's identity. Biometric readers can be affected by other things.
10 of 19
What are the advantages to using physical security measures?
They are tried and tested methods, therefore unlikely to go wrong.
11 of 19
What are some physical security measures?
ICT and specialistic hospital equipment should be kept in a secure area, security cameras, doors with magnetic key cards or number locks, security guards and backup tapes and disks should also be secured in a fireproof safe.
12 of 19
What are some software security methods?
User access permission, user access passwords, firewall and intrusion detection systems, encryption, virus protection and data backup and recovery.
13 of 19
What is the user access permissions security software?
The administrator allows staff to access the areas they need to work and not anything that isn't useful. Groups can be set up between different staff groups to share data if need be.
14 of 19
What is the user access passwords security software?
Each user account will be password protected. The network administrator will check the passwords conform to a set of rules and that they are updated regularly.
15 of 19
What is the firewall and Intrusion Detection System (IDS) security software?
Network firewalls prevent illegal access to the system. They can be hardware devices or software programs or both. The IDS monitor network or computer systems for malicious activity. If there is, a report will be sent to the network administrator.
16 of 19
What is the encryption security software?
It makes sure transmitted data is protected from hackers. It codes the files before transmission. The encryption makes sure only the person who is meant to read the information has the right encryption key to decode it.
17 of 19
What is the virus protection security software?
This software searches the computer system for viruses and deletes them when detected. Spyware can be loaded on the computer system as a virus. It must be deleted as it can gather data and illegally pass it on to parties who want it.
18 of 19
What is the data backup and recovery security software?
Data should be backed up on an external device such as a hard drive or magnetic tape. A local copy should be kept onsite, but one should also be kept far away in case of an emergency.
19 of 19

Other cards in this set

Card 2

Front

What can biometrics be used for?

Back

To control the access to either a computer system or a location.

Card 3

Front

What are the biometrics indicators usually based on?

Back

Preview of the front of card 3

Card 4

Front

How does palm print recognition operate?

Back

Preview of the front of card 4

Card 5

Front

What does a user do to work fingerprint recognition?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all B063: 2014 TechMed Pre-release Resource resources »