0% found this document useful (0 votes)
15 views11 pages

Group 11 Is 251

This document discusses Group 11's project on information systems security. It contains biometric authentication methods including fingerprint, facial, iris, voice, and DNA recognition. It outlines advantages such as security and convenience, and disadvantages like difficulty obtaining data and privacy concerns. The document also explains Kerberos network authentication using a trusted third party to issue tickets for resource access, providing strong cryptography protection. Advantages are centralized authentication and security, while disadvantages include complexity and costs of deployment.

Uploaded by

makangara22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views11 pages

Group 11 Is 251

This document discusses Group 11's project on information systems security. It contains biometric authentication methods including fingerprint, facial, iris, voice, and DNA recognition. It outlines advantages such as security and convenience, and disadvantages like difficulty obtaining data and privacy concerns. The document also explains Kerberos network authentication using a trusted third party to issue tickets for resource access, providing strong cryptography protection. Advantages are centralized authentication and security, while disadvantages include complexity and costs of deployment.

Uploaded by

makangara22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

INFORMATION

SYSTEMS SECURITY
GROUP 11
GROUP MEMBER REGISTRATION NUMBER

LAZARO C. PETER 27768/T.2021

HALIMA K. MASOUD 27749/T.2021

BOAZ D. MBILINYI 27733/T.2021

HAROLD M. MBUGI 27751/T.2021

SAID S. MARWA 27792/T.2021


BIOMETRY
 Biometry, as used in computer security, is the
science of measuring and analyzing biological
data to identify individuals and verify their
identity. Biometric authentication systems
compare an individual's biometric data with
the data stored in a database to determine their
identity and grant access to secure systems and
data.
 There are several types of biometric data that
can be used for authentication purposes,
including:
 Fingerprint recognition
 Facial recognition
 Iris recognition
 Voice recognition
 DNA analysis
 Fingerprint recognition: This method involves scanning
and analyzing the unique patterns of ridges and valleys on
an individual's fingers.
 Facial recognition: This method involves analyzing an
individual's facial features, such as the distance between
the eyes, the shape of the nose, and the contours of the
jawline.
 Iris recognition: This method involves scanning and
analyzing the unique patterns of the iris, the colored part
of the eye.
 Voice recognition: This method involves analyzing an
individual's voice patterns, including the tone, pitch, and
rhythm of their speech.
 DNA analysis: This method involves analyzing an
individual's DNA sequence, which is unique to each
person.
Advantages of biometry
 Biometric authentication systems have several
advantages over traditional authentication
methods. They are more secure, as biometric
data cannot be easily replicated or stolen. They
are also more convenient, as users do not need
to remember passwords or carry physical
tokens with them.
Disadvantes of biometry
 However, biometric authentication systems
also have some disadvantages. Biometric data
can sometimes be difficult to obtain or
unreliable, and there are concerns about the
privacy implications of collecting and storing
biometric data. Additionally, biometric
authentication systems can be expensive to
implement and maintain.
Kerberos
Kerberos is a network authentication protocol that
provides a secure way for users to log into
computers and access network resources. Kerberos
uses a trusted third party, called a Key Distribution
Center (KDC), to issue tickets that allow users to
access resources.
When a user wants to access a resource, they first
send a request to the KDC. The KDC then verifies
the user's identity and issues a ticket to the user.
The user then presents the ticket to the resource,
which verifies the ticket and grants the user access
Kerberos continue…
 Kerberos provides a secure authentication
process because it uses strong cryptography to
protect the user's credentials. It also uses a
trusted third party, the KDC, to issue tickets,
which makes it more difficult for an attacker to
spoof or steal tickets
Advantages of kerberos
 One of the main advantages of Kerberos is its
ability to centralize authentication and
authorization, making it easier to manage user
accounts and permissions across a large
network. It also provides a level of security that
is difficult to achieve with traditional
authentication methods such as passwords.
Disadvantages of kerberos
 However, implementing Kerberos can be
complex and requires careful planning and
configuration. It also requires the use of
specialized software and hardware, such as
Kerberos servers and client libraries, which can
add to the cost of deployment.

You might also like