Join Mike Chapple for an in-depth discussion in this video Biometrics, part of CompTIA Security+ Exam Prep (SY0-401): Access Control and Identity Management.
- Biometrics provide a means of identifying someone…based upon one or more physical characteristics…of that person.…They often serve as both identification…and authentication mechanisms…and fall into a category of authentication factors…known as something you are.…Good biometric authentication techniques…balance the difficulty of use…with the degree of security that they provide.…Effective systems provide easy enrollment.…The initial setup of a user…may require administrator assistance,…but it is accomplished fairly quickly…and with a minimum of fuss.…
They also provide low false acceptance rates.…They don't admit unauthorized people inadvertently.…At the same time, they have low false rejection rates.…They don't turn away people who should be admitted.…And finally, they have low intrusiveness.…They pass the creepiness test with users.…There are a wide variety of biometric authentication…techniques in use today.…Fingerprint readers are commonly found…on laptop computers, smartphones,…tablets, and similar devices.…
Author Mike Chapple, an IT leader with over 15 years experience, introduces identification methods such as usernames and biometrics, as well as authentication methods to verify users, including multifactor authentication, password authentication, and single sign-on. He also discusses authorization concepts such as mandatory and discretionary access controls, which can help you restrict access to sensitive parts of your network. The course also covers best practices for ongoing account management, such as establishing a good password policy, managing user roles, and monitoring accounts, and what to do when you need to suspend or terminate access.
NOTE: We are now a CompTIA Content Publishing Partner. Our training prepares members to pass CompTIA certification exams and become qualified IT professionals. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Setting policies for usernames and access cards
- Implementing biometrics
- Combining authentication factors for multifactor authentication
- Using a Kerberos access control system
- Using access control lists such as Windows NTFS file permissions
- Role-based authorization
- Implementing account and password policies