This document discusses Group 11's project on information systems security. It contains biometric authentication methods including fingerprint, facial, iris, voice, and DNA recognition. It outlines advantages such as security and convenience, and disadvantages like difficulty obtaining data and privacy concerns. The document also explains Kerberos network authentication using a trusted third party to issue tickets for resource access, providing strong cryptography protection. Advantages are centralized authentication and security, while disadvantages include complexity and costs of deployment.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
15 views11 pages
Group 11 Is 251
This document discusses Group 11's project on information systems security. It contains biometric authentication methods including fingerprint, facial, iris, voice, and DNA recognition. It outlines advantages such as security and convenience, and disadvantages like difficulty obtaining data and privacy concerns. The document also explains Kerberos network authentication using a trusted third party to issue tickets for resource access, providing strong cryptography protection. Advantages are centralized authentication and security, while disadvantages include complexity and costs of deployment.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11
INFORMATION
SYSTEMS SECURITY GROUP 11 GROUP MEMBER REGISTRATION NUMBER
LAZARO C. PETER 27768/T.2021
HALIMA K. MASOUD 27749/T.2021
BOAZ D. MBILINYI 27733/T.2021
HAROLD M. MBUGI 27751/T.2021
SAID S. MARWA 27792/T.2021
BIOMETRY Biometry, as used in computer security, is the science of measuring and analyzing biological data to identify individuals and verify their identity. Biometric authentication systems compare an individual's biometric data with the data stored in a database to determine their identity and grant access to secure systems and data. There are several types of biometric data that can be used for authentication purposes, including: Fingerprint recognition Facial recognition Iris recognition Voice recognition DNA analysis Fingerprint recognition: This method involves scanning and analyzing the unique patterns of ridges and valleys on an individual's fingers. Facial recognition: This method involves analyzing an individual's facial features, such as the distance between the eyes, the shape of the nose, and the contours of the jawline. Iris recognition: This method involves scanning and analyzing the unique patterns of the iris, the colored part of the eye. Voice recognition: This method involves analyzing an individual's voice patterns, including the tone, pitch, and rhythm of their speech. DNA analysis: This method involves analyzing an individual's DNA sequence, which is unique to each person. Advantages of biometry Biometric authentication systems have several advantages over traditional authentication methods. They are more secure, as biometric data cannot be easily replicated or stolen. They are also more convenient, as users do not need to remember passwords or carry physical tokens with them. Disadvantes of biometry However, biometric authentication systems also have some disadvantages. Biometric data can sometimes be difficult to obtain or unreliable, and there are concerns about the privacy implications of collecting and storing biometric data. Additionally, biometric authentication systems can be expensive to implement and maintain. Kerberos Kerberos is a network authentication protocol that provides a secure way for users to log into computers and access network resources. Kerberos uses a trusted third party, called a Key Distribution Center (KDC), to issue tickets that allow users to access resources. When a user wants to access a resource, they first send a request to the KDC. The KDC then verifies the user's identity and issues a ticket to the user. The user then presents the ticket to the resource, which verifies the ticket and grants the user access Kerberos continue… Kerberos provides a secure authentication process because it uses strong cryptography to protect the user's credentials. It also uses a trusted third party, the KDC, to issue tickets, which makes it more difficult for an attacker to spoof or steal tickets Advantages of kerberos One of the main advantages of Kerberos is its ability to centralize authentication and authorization, making it easier to manage user accounts and permissions across a large network. It also provides a level of security that is difficult to achieve with traditional authentication methods such as passwords. Disadvantages of kerberos However, implementing Kerberos can be complex and requires careful planning and configuration. It also requires the use of specialized software and hardware, such as Kerberos servers and client libraries, which can add to the cost of deployment.