Top Banner
Matterhorn Business Solutions Tel. 587-350-1082 Email: [email protected] http://matterhornsolutions.ca/calgary-tech-support/ Computer Security Trends Enforcing Digital Security via User Authentication
14

Computer Security Trends

Jan 21, 2018

Download

Technology

Matthew Horner
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

Computer Security TrendsEnforcing Digital Security via User Authentication

Page 2: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

In our day-to-day technical support for Calgary companies, one of the most common I.T. requests is the password reset.

Page 3: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

The simple text password is one of the most basic forms of authentication. There are, however, many other ways to authenticate access to a resource.

In this article we discuss computer security trends.

Page 4: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

Authentication is used to

• verify the user’s identity

• to control access to the resources

• to prevent unauthorized users from accessing the system, and

• to store system logs about users’ activities.

Page 5: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

There are two basic modes of authentication:

• Verification (a 1-to-1 comparison)

• Identification (a 1-to-many comparison)

Page 6: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

There are 3 basic authentication methods:

• Something we know (password, key sequence etc.)

• Something we have (token, smartcard etc.)

• Something we are (biometrics – fingerprints, eye scan etc.)

Page 7: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

However, passwords can be stolen or tokens can be lost.

Therefore, enter biometrics.

Page 8: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

Biometric authentication is a process of analysis of someone’s physical characteristics, or behavioral aspects, in order to prove the person’s identity.

Page 9: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

The phrase biometrics comes from the Greek language: bio (= life) and metric (= to measure).

A well-known concept for biometrics is the use of fingerprints for personal identification, at a police station for example.

Page 10: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

A good biometric method should possess the following 3 properties:

• Broadness: almost all people should have the characteristic.

• Stability: the characteristic should not change or mutate.

• Exclusiveness: the characteristic of each person should be unique.

Page 11: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

The biometric authentication can be completed in 2 ways:

• Physical characteristics recognition –based on some physical feature for identification and authentication, like fingerprints.

• Behavioral characteristic recognition –based on some dynamic characteristics, such as keyboard typing, writing, or a hand signature.

Page 12: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

Common biometric technologies are:

• Face biometrics

• Fingerprint biometrics

• Eye biometrics

• Hand geometry biometrics

• Signature biometrics

• Voice biometrics

Page 13: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

Less commonly used biometric technologies:

• Keystroke dynamics

• Vein recognition

• Body odor measurement

• Palm-print

• Gait recognition

• Ear shape

• DNA recognition

Page 14: Computer Security Trends

Matterhorn Business SolutionsTel. 587-350-1082Email: [email protected]://matterhornsolutions.ca/calgary-tech-support/

These are just some of the biotechnologies that we can expect to commonly see in the future.