The complete guide to implementing biometric security solutions for your network
Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application.
In Biometrics for Network Security, biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems.
An introduction to authentication technologies and biometrics
Dealing with privacy issues
Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face
Security concerns related to biometrics, including attempts to spoof or fake results
Deployment of biometric security systems, including vendor selection and roll out procedures
Real-life case studies
For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
Table of contents
- Prentice Hall PTR Series in Computer Networking and Distributed Systems
- About Prentice Hall Professional Technical Reference
1. Introduction and Background
- What Makes This Book Different?
- The Structure of This Book
- Everything You Need to Know about Biometrics to Understand the First Three Chapters
- Who Should Read This Book?
2. Authentication Technologies
- Something You Know
- Something You Have
- Something You Are
- The Need for Strong Authentication
- The Role of Strong Authentication with Single Sign-On (SSO)
- Biometric Technologies: An Intelligent Solution
3. Protecting Privacy with Biometrics and Policy
Employer's Right to Privacy
- Protection of Trade Secrets and Proprietary Information
- Protection of Personal Data about Employees and Customers
- Background Checks
- External Reporting and Auditing Requirements
- Access Control
Employee's Right to Privacy
- Protection of Personal Data Collected by the Employer
Creating a Positive Biometric Policy
- Biometric enrollment
- Template storage and transmission
- Where verification takes place
- What can the biometric data be used for?
- Will it be used in correlation with other data?
- Length of storage of the biometric data
- Audit trails for access to the biometric data
- Audit trails created for verification
- Will biometric data be shared with third parties?
- What options do employees have who cannot or will not use biometrics?
- Employer's Right to Privacy
- 1. Introduction
2. Biometric Technologies
4. Biometric Technologies
- User Interaction with Biometric Technology
What Makes a Good Biometric?
- User Acceptance
- Ease of Use
- Technology Cost
- Invasiveness of the Technology
- Maturity of the Technology
- Time It Takes for a User to Become Habituated
- What Makes a Good Biometric for Network Security?
5. Finger Biometric Technologies
- General Description of Fingerprints
- How Is the Finger Imaged?
- Types of Algorithms Used for Interpretation
- How Can this Biometric be Spoofed?
6. Face Biometric Technologies
- General Description of Face Biometrics
- How Is the Face Imaged?
- What Types of Algorithms Are Used for Facial Interpretation?
- How Can This Biometric Be Spoofed?
7. Voice Biometric Technologies
- General Description of Voice Biometrics
- How Is the Voice Captured?
- Types of Algorithms Used for Voice Interpretation
- How Can This Biometric Be Spoofed?
- 8. Iris Biometric Technology
- 4. Biometric Technologies
3. Implementing Biometrics for Network Security
9. Recommended Biometric for Network Security
- Finger Biometrics
- Face Biometrics
- Voice Biometrics
- Iris Biometrics
- The Choice of a Biometric for Network Access
10. An Introduction to Statistical Measures of Biometrics
- What Measure Is Most Important?
11. The Biometric Transaction
- Securing and Trusting a Biometric Transaction
- Matching Location
12. Preparing for the Proof of Concept and Selecting a Vendor
- Define the Driver of the Project as Either Corporate IT or a Business Need
- Define the Business Need or Objectives
- Designate the Internal Sponsor of the Project
- Define the Stakeholders
- Define a Clear Set of Goals and Success Criteria for the Project
- Form and Charter the POC Group
- Based on the Goals and Success Criteria, Invite a Few Vendors to Pilot
- Set the Timelines for the POC and Ensure That the Implementation Activities Are Done Within the Scope of the POC
- Deploy the POC
- Monitor and Evaluate the POC
- Wrap Up the POC
- Decide on the Validity of Each Vendor's Solution
- Make a Go/No Go Decision to Move Ahead
- Announce the Results and Lay the Groundwork for the Next Phase
13. Preparing for the Pilot Deployment
- Define the Group of Stakeholders
- Put in Place a Project Management Team That Can See the Solution Through to Rollout
- Form and Charter the Pilot Group
- Develop Policy Documents
- Summarize Daily Reports Weekly and Send Them Out
- Address and Track Problems and Solutions As They Happen
- Put a Training Plan in Place
- Prepare Audit and Analysis Reports
- Build and Test an Automated Install
- Roll Out the Software and Hardware in a Practical Manner
- Provide Mechanisms for Feedback
- After Initial Pilot Rollout, Get the Executives Involved
- Start Addressing Issues of Scalability and Manageability for Rollout
- Near the End of the Pilot, Start Discussing the Next Steps
- Wrap Up the Pilot
- Make a Go/No Go Decision
- Build a Transition Book
- 14. Preparing for the Rollout
- 9. Recommended Biometric for Network Security
- 4. Future and Conclusions
- Title: Biometrics for Network Security
- Release date: December 2003
- Publisher(s): Pearson
- ISBN: 9780131015494
You might also like
Network Defense and Countermeasures: Principles and Practices, Third edition
All you need to know about defending networks, in one book Clearly explains concepts, terminology, challenges, …
Official (ISC)2 Guide to the CISSP CBK, 4th Edition
As a result of a rigorous, methodical process that (ISC) follows to routinely update its credential …
Computer Security Fundamentals, 4th Edition
Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The …
Auditing IT Infrastructures for Compliance, 2nd Edition
The Second Edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent …