Saturday, August 13, 2011

SECURITY TECHNOLOGY

III.  ACCESS CONTROL SOFTWARE


Image credit from Google.com.ph
Access control is a mechanism which a system grants or revokes the right to access the data. It is commonly used by the user to login to a system using "Authentication System".  




It controls the following data:
  • File permission such as create, read and edit on file servers.
  • Program permissions, such as the right to execute a program on application servers.
  • Data rights, such as the right to retrieve or update information in a database.


(http://hitachi-id.com/concepts/access_control.html) 




Also it include the following:

  • Automate and unify visioning, role management, password management, single sign-on and privileged account management.
  • Ensure that identity and access management activities are supporting business objectives.
  • Provide segregation of duties and access control.


(http://www.quest.com/identity-management/)

SECURITY TECHNOLOGY

 IV.  FIREWALL


Firewall is a system designed to prevent unauthorized access to a network and servers.All messages, pictures, and other personal data passes through the firewall and any suspicious files were automatically blocked. It serves as protection from any harmful and unnecessary objects inside and outside the internet.It works closely to the router program which each network packet to determine whether to forward it on its selected destination. Also, It includes proxy server which make network request on the behalf of the server and workstation users.
As of today, Firewall serves as a great savior of computer files. Because it does block unknown pop-up data and application which somehow contain harmful effect to my files and to my computer. 


Big companies like Apple™ Inc. and Microsoft™ has a vast and great firewalls that ensures their computer safety. Like us, It has great help for them to develop and send personal messages without the disturbance of other people. These firewalls ensures that privacy will be achieved like the other security technology devices had. It just need proper knowledge and some training so that it could do its job nor task very well.

SECURITY TECHNOLOGY

II. ENCRYPTION


Image credit from Google.com.ph
    Encryption is the conversion of data into "ciphertext " which cannot be easily understood by other people. It is used during wars to keep the enemies away from obtaining the contents of their transmissions. In order to get the encrypted codes and signals back, You need to have what they call "decryption key" to undo the encryption algorithm. The stronger the cipher, the harder it will be broken down by unauthorized access of others.


           
      
    Encryption is commonly used to wireless communications and carrying out sensitive transactions like credited cards transactions online and discussion of a company secret between different departments of the organization. It aims to secure our information so that no one will stole or manipulated the important files we have. Encryption may give others the confidence to start online jobs in the internet or make business online. Maintaining privacy in our personal communications, business and other important matter is what everyone desires.

   



SECURITY TECHNOLOGY

I. BIOMETRIC


Biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes:
  • To verify 
  • or To identify users. 

Biometrics is the most secure and convenient authentication tool. It can not be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individual's unique physical or behavioral characteristics to recognize or authenticate their identity.

Biometric technology can help the society to protect itself from possible threats of crimes and other negative effects related to it. It can serve as a surveillance
using facial and body recognition technologies, The modern researchers  hope to use biometrics to automatically identify known suspects entering buildings or traversing crowded security areas.



Here comes a list of biometrics :

                                

Image credit from Google.com.ph
  • Fingerprint 
A fingerprint looks at the patterns found on a fingertip.There are a variety of approaches to fingerprint verification, such as traditional police method, using pattern-matching devices, and things like moire fringe patterns and ultrasonics. This seems to be a very good choice for in-house systems.






  • Hand Geometry

Image Credit from Google.com.ph
This involves analyzing and measuring the shape of the hand. It might be suitable where there are more users or where user access the system infrequently. Accuracy can be very high if desired, and flexible performance tuning and configuration can accommodate a wide range of applications. Organizations are using hand geometry readers in various scenarios, including time and attendance recording.





  • Retina
Image credit from Google.com.ph
A retina-based biometric involves analyzing the layer of blood vessels situated at the back of the eye. This technique involves using a low intensity light source through an optical coupler to scan the unique patterns of the retina. Retinal scanning can be quite accurate but does require the user to look into a receptacle and focus on a given point


  • Iris
Image credit from google.com.ph
An iris-based biometric involves analyzing features found in the colored ring of tissue that surrounds the pupil. This uses a fairly conventional camera element and requires no close contact between the user and the reader. Further, it has the potential for higher than average template-matching performance.




Image credit from Google.com.ph
  • Face
Face recognition analyses facial characteristics. It requires a digital camera to develop a facial image of the user for authentication. It was used in most of offices and government institutions to serve as a record of some sort of important file.





  • Signature
Image credit from Google.com.ph
Signature verification analyses the way user signs his name. Signing features such as speed, velocity, and pressure are as important as the finished signature's static shape. People are used to signatures as a means of transaction-related identity verification.



  • Voice
Image credit from Google.com.ph
 Voice authentication is based on voice-to-print authentication, where complex technology transforms voice into text. Voice biometrics requires a microphone, which is available with PCs nowadays. Voice biometrics is to replace the currently used methods, such as PINs, passwords, or account names. 






But as Biometrics are used these days,
It turns out that it has negative effect such as:
  • Some Biometric apparatus or devices are difficult to handle..
    Proper training is extremely required.
  • Time may affect the accuracy of biometric data. For example a person got old,
    Biometric data may cause changes and sometimes bring error to the data.


There are many things that we should remember about these devices.
It is neither it brought cure nor harm to us. Possibility that it may lessen the crime rate to our country is not hard if we just help each other to live our life to its limits with no one is going to be hurt or thrown down. 







Internet Reference: http://www.peterindia.net/BiometricsView.html