8.5 Biometrics

While biometrics are not strictly a host-only or computer security countermeasure, that is to say, biometrics are also used to protect premises and access to network resources as well, it is appropriate for our discussion to introduce this topic here. First, however, realize that the term biometrics encompasses a huge field, not just what typically comes to mind, such as using fingerprints or retinal scans for authentication to allow entrance into a server room or log on to a laptop computer. It’s applied across an array of technologies using a range of techniques.

Many of us are already familiar with cardkeys, smart cards, and access tokens. For example, HDLock® from Authenex uses a token, called A-Key that plugs into a USB port ...

Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.