Book description
The complete guide to implementing biometric security solutions for your network
Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application.
In Biometrics for Network Security, biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems.
Coverage includes:
An introduction to authentication technologies and biometrics
Dealing with privacy issues
Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face
Security concerns related to biometrics, including attempts to spoof or fake results
Deployment of biometric security systems, including vendor selection and roll out procedures
Real-life case studies
For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
Table of contents
- Copyright
- Prentice Hall PTR Series in Computer Networking and Distributed Systems
- About Prentice Hall Professional Technical Reference
- Foreword
- Preface
- Acknowledgments
-
1. Introduction and Background
- 1. Introduction
- 2. Authentication Technologies
-
3. Protecting Privacy with Biometrics and Policy
- Employer's Right to Privacy
-
Employee's Right to Privacy
- Protection of Personal Data Collected by the Employer
-
Creating a Positive Biometric Policy
- Biometric enrollment
- Template storage and transmission
- Verification
- Where verification takes place
-
Terms of use and audit statements
- What can the biometric data be used for?
- Will it be used in correlation with other data?
- Length of storage of the biometric data
- Audit trails for access to the biometric data
- Audit trails created for verification
- How the employer is audited against terms of use
- Will biometric data be shared with third parties?
- What options do employees have who cannot or will not use biometrics?
- Conclusion
-
2. Biometric Technologies
- 4. Biometric Technologies
- 5. Finger Biometric Technologies
- 6. Face Biometric Technologies
- 7. Voice Biometric Technologies
- 8. Iris Biometric Technology
-
3. Implementing Biometrics for Network Security
- 9. Recommended Biometric for Network Security
- 10. An Introduction to Statistical Measures of Biometrics
- 11. The Biometric Transaction
-
12. Preparing for the Proof of Concept and Selecting a Vendor
- Define the Driver of the Project as Either Corporate IT or a Business Need
- Define the Business Need or Objectives
- Designate the Internal Sponsor of the Project
- Define the Stakeholders
- Define a Clear Set of Goals and Success Criteria for the Project
- Form and Charter the POC Group
- Based on the Goals and Success Criteria, Invite a Few Vendors to Pilot
- Set the Timelines for the POC and Ensure That the Implementation Activities Are Done Within the Scope of the POC
- Deploy the POC
- Monitor and Evaluate the POC
- Wrap Up the POC
- Decide on the Validity of Each Vendor's Solution
- Make a Go/No Go Decision to Move Ahead
- Announce the Results and Lay the Groundwork for the Next Phase
- Conclusion
-
13. Preparing for the Pilot Deployment
- Define the Group of Stakeholders
- Put in Place a Project Management Team That Can See the Solution Through to Rollout
- Form and Charter the Pilot Group
- Develop Policy Documents
- Summarize Daily Reports Weekly and Send Them Out
- Address and Track Problems and Solutions As They Happen
- Put a Training Plan in Place
- Prepare Audit and Analysis Reports
- Build and Test an Automated Install
- Roll Out the Software and Hardware in a Practical Manner
- Provide Mechanisms for Feedback
- After Initial Pilot Rollout, Get the Executives Involved
- Start Addressing Issues of Scalability and Manageability for Rollout
- Near the End of the Pilot, Start Discussing the Next Steps
- Wrap Up the Pilot
- Make a Go/No Go Decision
- Build a Transition Book
- Conclusion
- 14. Preparing for the Rollout
- 4. Future and Conclusions
- Glossary
- Bibliography
Product information
- Title: Biometrics for Network Security
- Author(s):
- Release date: December 2003
- Publisher(s): Pearson
- ISBN: 9780131015494
You might also like
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Network Security First-Step, Second Edition
Network Security first-step Second Edition Tom Thomas and Donald Stoddard Your first step into the world …
book
Advances in Biometrics for Secure Human Authentication and Recognition
Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about …
book
Iris Biometric Model for Secured Network Access
Biometric techniques have proven their ability to provide secure access to shared resources in various domains …