The complete guide to implementing biometric security solutions for your network
Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application.
In Biometrics for Network Security, biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems.
For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
I. INTRODUCTION AND BACKGROUND.1. Introduction.
What Makes This Book Different? The Structure of This Book. Everything You Need to Know about Biometrics to Understand the First Three Chapters. Who Should Read This Book? Conclusion.2. Authentication Technologies.
Something You Know. Something You Have. Something You Are. The Need for Strong Authentication. The role of Strong Authentication with Single Sign-On (SSO). Biometric Technologies: An Intelligent Solution. Conclusion.3. Protecting Privacy with Biometrics and Policy.
Employer's Right to Privacy. Employee's Right to Privacy. Conclusion.
II. BIOMETRIC TECHNOLOGIES.4. Biometric Technologies.
User Interaction with Biometric Technology. What Makes a Good Biometric? What Makes a Good Biometric for Network Security? Conclusion.5. Finger Biometric Technologies.
General Description of Fingerprints. How Is the Finger Imaged? Types of Algorithms Used for Interpretation. How Can this Biometric be Spoofed? Conclusion.6. Face Biometric Technologies.
General Description of Face Biometrics. How Is the Face Imaged? What Types of Algorithms Are Used for Facial Interpretation? How Can This Biometric Be Spoofed? Conclusion.7. Voice Biometric Technologies.
General Description of Voice Biometrics. How Is the Voice Captured? Types of Algorithms Used for Voice Interpretation. How Can This Biometric Be Spoofed? Conclusion.8. Iris Biometric Technology.
General Description of Iris Biometrics. How Is the Iris Captured? Description of the Iris Algorithm. How Can This Biometric Be Spoofed? Conclusion.
III. IMPLEMENTING BIOMETRICS FOR NETWORK SECURITY.9. Recommended Biometric for Network Security.
Finger Biometrics. Face Biometrics. Voice Biometrics. Iris Biometrics. The Choice of a Biometric for Network Access. Conclusion.10. An Introduction to Statistical Measures of Biometrics.
FAR. FRR. FTE. EER. What Measure Is Most Important? Conclusion.11. The Biometric Transaction.
Securing and Trusting a Biometric Transaction. Matching Location. Conclusion.12. Preparing for the Proof of Concept and Selecting a Vendor.
Define the Driver of the Project as Either Corporate IT or a Business Need. Define the Business Need or Objectives. Designate the Internal Sponsor of the Project. Define the Stakeholders. Define a Clear Set of Goals and Success Criteria for the Project. Form and Charter the POC Group. Based on the Goals and Success Criteria, Invite a Few Vendors to Pilot. Set the Timelines for the POC and Ensure That the Implementation Activities Are Done Within the Scope of the POC. Deploy the POC. Monitor and Evaluate the POC. Wrap Up the POC. Decide on the Validity of Each Vendor's Solution. Make a Go/No Go Decision to Move Ahead. Announce the Results and Lay the Groundwork for the Next Phase. Conclusion.13. Preparing for the Pilot Deployment.
Define the Group of Stakeholders. Put in Place a Project Management Team That Can See the Solution Through to Rollout. Form and Charter the Pilot Group. Develop Policy Documents. Summarize Daily Reports Weekly and Send Them Out. Address and Track Problems and Solutions As They Happen. Put a Training Plan in Place. Prepare Audit and Analysis Reports. Build and Test an Automated Install. Roll Out the Software and Hardware in a Practical Manner. Provide Mechanisms for Feedback. After Initial Pilot Rollout, Get the Executives Involved. Start Addressing Issues of Scalability and Manageability for Rollout. Near the End of the Pilot, Start Discussing the Next Steps. Wrap Up the Pilot. Make a Go/No Go Decision. Build a Transition Book. Conclusion.14. Preparing for the Rollout.
Why Is This Chapter So Short? Conclusion.
IV. FUTURE AND CONCLUSIONS.15. The Future of Biometric Authentication.
Will Biometrics Be Integrated Everywhere? What Other Biometric Measures Will Exist? A Futuristic Example: New Form of “Caller ID”. Conclusion.Glossary.