Index

Note: Page numbers followed by f indicate figures and t indicate tables.

A

Access control system (ACS)
biometric signatures, 160
credentials, 159–160
DiD strategy, 157
facility, 158–159
role of, 158
Advanced exterior sensor (AES), 235
Aggressor’s methods of operations (AMO), 197
ASIS International Symposium Security Model, 16, 16t
Availability heuristics, 73

B

Bayes theory, 54–55
Biometric systems
acceptability, 168
attacking, 169–171
biological traits, 163
factual identification, 163
fingerprint, 164
hand vein pattern, 164, 165f
iris pattern, 164, 166, 166f
keyboard typing rhythms, 167
multimodal systems, 171
physical characteristics, 164
properties, 168
restrict access, 169
retinal vein patterns, 164, 165f, 166
schematic structure, 167–168 ...

Get Security Science now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.