Discuss how biometric access handles physical access control.

What will be an ideal response?


The best way to prevent loss of access control is to build physical security around a key that cannot be shared or lost. Biometric access calls for using a unique physical characteristic of a person to permit access to a controlled IT resource. Doorways can be triggered to unlock using fingerprint readers, facial recognition cameras, voice analyzers, retinal blood vessel scanners, or other, more exotic characteristics. While not perfect, biometrics represent a giant leap in secure access. For even more effective access control, multifactor authentication can be used, where access is granted based on more than one access technique. For instance, in order to gain access to a secure server room, a user might have to pass a fingerprint scan and have an approved security fob.
 

Computer Science & Information Technology

You might also like to view...

List all the details of employees who are female.

What will be an ideal response?

Computer Science & Information Technology

Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic, is resource intensive, and requires extensive tuning and maintenance?

A. brute force B. heuristic C. signature D. anomaly

Computer Science & Information Technology

When you press the left mouse button two times in rapid succession while holding the mouse still, you are:

A) opening the item B) copying C) generating a shortcut menu D) moving

Computer Science & Information Technology

Characters are made up of smaller elements called ____.

A. fields B. records C. bits D. bytes

Computer Science & Information Technology