Posts

Showing posts from November, 2024

Biometric authentication methods

  Among the types of biometrics used for authentication are finger, vein, combined fingerprint and vein, iris, facial, hand geometry, voice, retina scanning and gait recognition. The advantages of fingerprint identification are the speed of recognition, increasing accuracy and relatively low cost. Disadvantages are the fact that fingers might be dirty or there might be injuries on them as well as the need to clean sensors frequently. The major advantage of vein scanning is the fact it is very difficult to forge as vein pattern is set pre-birth and never changes. The drawback of this technology is the fact that the readers are rather expensive. Combined fingerprint and vein recognition approach provides increased security and flexibility if fingers are damaged with the cost being a disadvantage. The advantages of iris recognition are the fact that it has a very low percentage of those who cannot enrol, high accuracy and security. The cons include the cost and the fear o...

Ensuring physical security

  There are number of physical security threats faced by an organisation. Thieves and threat actors might break in and steal the IT equipment, plug in their devices, cut off company’s cables or connect to a company network with their device. Measures exist to protect the IT equipment and company data from physical access. It is recommended to lock the rooms where the IT equipment is stored and particular attention should be paid to the server room. A smart card, a swipe card system or a biometric identification system should be considered as this would allow to monitor the behaviour of each user. With the above implemented, any suspicious behaviour could be swiftly investigated. It is also advisable to install CCTV cameras monitoring who has entered the IT equipment room and who is in it an any given time. That is because smart cards can stop working or tailgating technique could be used. To prevent break-ins, alarms should be installed that will alert security when ...