Dig into biometric identification the fun and friendly Dummies way!
Biometrics — the science of identifying humans based on unique physical characteristics — is growing in popularity among security experts and security-minded organizations. Once the realm of futurists and sci-fi, biometrics is now commonly used to reliably control whether to let you into a facility or allow you to use a computer system. Here's what it is, what it does, and how to use it.
No lying eyes — how scans of the retina and iris establish a person's identity
"Triple A" gets you there — understand how to use authentication, authorization, and audit principles
Security vs. privacy — how various countries are handling the privacy issues and what can be done to protect citizens' privacy
Ethics, please — understand the ethical issues raised by the growing use of biometric information
Palm reading, 21st century style — how a scan of the palm, veins in the hand, and sonar imagery establish identity
Sign here — what it takes to fully authenticate a signature
Walk this way — using gait, speech, linguistic analysis, and other types of behavioral biometrics
Securing the security — learn the many vulnerabilities of biometric systems and how to guard against them
Open the book and find:
Behavioral as well as physiological biometric measures
Tips for choosing the right biometric system
What Triple A is and how to use it
An overview of laws regarding biometrics
How Heisenberg's Uncertainty Principle affects signatures
Peter H. Gregory, CISA, CISSP is the security strategist for a financial management software company in Redmond. He is the author of twelve books on security and technology including Solaris Security, Blocking Spam and Spyware for Dummies and Enterprise Information Security. Peter speaks at numerous information security industry conferences including the RSA, SecureWorld Expo, InfraGard, and West Coast Security Forum.