Posted by: Robert Davis
Access Controls, Authentication, Biometrics, Crackers, Hackers, IAP, Identification, Information Assets Protection, Information Security, Information Security Infrastructure Management, ISIM
Most information security practitioners accept biometrics as the science employing distinctive human attributes to discern access right validity. Specifically, imparting the Information Systems Audit and Control Association’s definition, biometrics is the process for identifying or authenticating a living person’s identity based on physiological or behavioral characteristics. Delineated, biometrics identification usually involves a one-to-many individual characteristics search utilizing linked data repositories; whereas biometric authentication entails establishing a one-to-one relationship verifying the claim to an identity made by an individual.
“View Part I of the Biometric Technology series here“