Biometrics and Network Security (Paperback)
暫譯: 生物識別技術與網路安全 (平裝本)

Paul Reid

  • 出版商: Prentice Hall
  • 出版日期: 2003-12-30
  • 售價: $1,880
  • 貴賓價: 9.5$1,786
  • 語言: 英文
  • 頁數: 288
  • 裝訂: Paperback
  • ISBN: 0131015494
  • ISBN-13: 9780131015494
  • 相關分類: 資訊安全
  • 已絕版

買這商品的人也買了...

商品描述

 

Summary

A guide to integrating biometrics in the process of network security. Covers: finger, iris, retina, voice and fac biometrics. Emphasis on how to quantify the strength of a particular biometric. Complete with guidelines for deployment in a large enterprise, one of author's clients is Citibank and they are about to start using biometrics in their network authentication system around the world.

Table of Contents

Foreword.

Preface.

Acknowledgments.

I. INTRODUCTION AND BACKGROUND.

1. Introduction.

What Makes This Book Different? The Structure of This Book. Everything You Need to Know about Biometrics to Understand the First Three Chapters. Who Should Read This Book? Conclusion.

2. Authentication Technologies.

Something You Know. Something You Have. Something You Are. The Need for Strong Authentication. The role of Strong Authentication with Single Sign-On (SSO). Biometric Technologies: An Intelligent Solution. Conclusion.

3. Protecting Privacy with Biometrics and Policy.

Employer's Right to Privacy. Employee's Right to Privacy. Conclusion.

II. BIOMETRIC TECHNOLOGIES.

4. Biometric Technologies.

User Interaction with Biometric Technology. What Makes a Good Biometric? What Makes a Good Biometric for Network Security? Conclusion.

5. Finger Biometric Technologies.

General Description of Fingerprints. How Is the Finger Imaged? Types of Algorithms Used for Interpretation. How Can this Biometric be Spoofed? Conclusion.

6. Face Biometric Technologies.

General Description of Face Biometrics. How Is the Face Imaged? What Types of Algorithms Are Used for Facial Interpretation? How Can This Biometric Be Spoofed? Conclusion.

7. Voice Biometric Technologies.

General Description of Voice Biometrics. How Is the Voice Captured? Types of Algorithms Used for Voice Interpretation. How Can This Biometric Be Spoofed? Conclusion.

8. Iris Biometric Technology.

General Description of Iris Biometrics. How Is the Iris Captured? Description of the Iris Algorithm. How Can This Biometric Be Spoofed? Conclusion.

III. IMPLEMENTING BIOMETRICS FOR NETWORK SECURITY.

9. Recommended Biometric for Network Security.

Finger Biometrics. Face Biometrics. Voice Biometrics. Iris Biometrics. The Choice of a Biometric for Network Access. Conclusion.

10. An Introduction to Statistical Measures of Biometrics.

FAR. FRR. FTE. EER. What Measure Is Most Important? Conclusion.

11. The Biometric Transaction.

Securing and Trusting a Biometric Transaction. Matching Location. Conclusion.

12. Preparing for the Proof of Concept and Selecting a Vendor.

Define the Driver of the Project as Either Corporate IT or a Business Need. Define the Business Need or Objectives. Designate the Internal Sponsor of the Project. Define the Stakeholders. Define a Clear Set of Goals and Success Criteria for the Project. Form and Charter the POC Group. Based on the Goals and Success Criteria, Invite a Few Vendors to Pilot. Set the Timelines for the POC and Ensure That the Implementation Activities Are Done Within the Scope of the POC. Deploy the POC. Monitor and Evaluate the POC. Wrap Up the POC. Decide on the Validity of Each Vendor's Solution. Make a Go/No Go Decision to Move Ahead. Announce the Results and Lay the Groundwork for the Next Phase. Conclusion.

13. Preparing for the Pilot Deployment.

Define the Group of Stakeholders. Put in Place a Project Management Team That Can See the Solution Through to Rollout. Form and Charter the Pilot Group. Develop Policy Documents. Summarize Daily Reports Weekly and Send Them Out. Address and Track Problems and Solutions As They Happen. Put a Training Plan in Place. Prepare Audit and Analysis Reports. Build and Test an Automated Install. Roll Out the Software and Hardware in a Practical Manner. Provide Mechanisms for Feedback. After Initial Pilot Rollout, Get the Executives Involved. Start Addressing Issues of Scalability and Manageability for Rollout. Near the End of the Pilot, Start Discussing the Next Steps. Wrap Up the Pilot. Make a Go/No Go Decision. Build a Transition Book. Conclusion.

14. Preparing for the Rollout.

Why Is This Chapter So Short? Conclusion.

IV. FUTURE AND CONCLUSIONS.

15. The Future of Biometric Authentication.

Will Biometrics Be Integrated Everywhere? What Other Biometric Measures Will Exist? A Futuristic Example: New Form of “Caller ID”. Conclusion.

Glossary.
Bibliography.
Index.

商品描述(中文翻譯)

摘要

本書是關於在網路安全過程中整合生物識別技術的指南。內容涵蓋:指紋、虹膜、視網膜、聲音和面部生物識別。重點在於如何量化特定生物識別的強度。書中提供了在大型企業中部署的指導方針,作者的客戶之一是花旗銀行,他們即將在全球的網路身份驗證系統中使用生物識別技術。

目錄

前言。

序言。

致謝。

I. 介紹與背景。

1. 介紹。
本書有何不同?本書的結構。理解前三章所需的生物識別知識。誰應該閱讀本書?結論。

2. 身份驗證技術。
你所知道的東西。你所擁有的東西。你所是的東西。強身份驗證的必要性。強身份驗證在單一登入(SSO)中的角色。生物識別技術:一種智能解決方案。結論。

3. 用生物識別技術和政策保護隱私。
雇主的隱私權。員工的隱私權。結論。

II. 生物識別技術。

4. 生物識別技術。
用戶與生物識別技術的互動。什麼是好的生物識別?什麼是適合網路安全的好生物識別?結論。

5. 指紋生物識別技術。
指紋的一般描述。如何獲取指紋影像?用於解釋的算法類型。這種生物識別如何被欺騙?結論。

6. 面部生物識別技術。
面部生物識別的一般描述。如何獲取面部影像?用於面部解釋的算法類型。這種生物識別如何被欺騙?結論。

7. 聲音生物識別技術。
聲音生物識別的一般描述。如何捕捉聲音?用於聲音解釋的算法類型。這種生物識別如何被欺騙?結論。

8. 虹膜生物識別技術。
虹膜生物識別的一般描述。如何獲取虹膜影像?虹膜算法的描述。這種生物識別如何被欺騙?結論。

III. 在網路安全中實施生物識別技術。

9. 網路安全的推薦生物識別。
指紋生物識別。面部生物識別。聲音生物識別。虹膜生物識別。選擇用於網路訪問的生物識別。結論。

10. 生物識別的統計測量介紹。
FAR。FRR。FTE。EER。哪個測量最重要?結論。

11. 生物識別交易。
確保和信任生物識別交易。匹配位置。結論。

12. 準備概念驗證並選擇供應商。
定義項目的驅動因素為企業IT或商業需求。定義商業需求或目標。指定項目的內部贊助者。定義利益相關者。為項目定義明確的目標和成功標準。組建並授權POC小組。根據目標和成功標準,邀請幾個供應商進行試點。設定POC的時間表,確保實施活動在POC範圍內完成。部署POC。監控和評估POC。總結POC。決定每個供應商解決方案的有效性。做出是否繼續的決策。宣布結果並為下一階段奠定基礎。結論。

13. 準備試點部署。
定義利益相關者小組。建立一個能夠將解決方案推進到實施的項目管理團隊。組建並授權試點小組。制定政策文件。每週總結日報並發送。及時處理和跟蹤問題及解決方案。制定培訓計劃。準備審計和分析報告。建立並測試自動安裝。以實際方式推出軟體和硬體。提供反饋機制。在初步試點推出後,讓高層參與。開始解決擴展性和可管理性問題。接近試點結束時,開始討論下一步。總結試點。做出是否繼續的決策。建立過渡文檔。結論。

14. 準備推出。
為什麼這一章這麼短?結論。

IV. 未來與結論。

15. 生物識別身份驗證的未來。
生物識別技術會無處不在嗎?還會有哪些其他生物識別措施?一個未來的例子:新型“來電顯示”。結論。

術語表。

參考文獻。

索引。

最後瀏覽商品 (20)