Page 974 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 974

scans, retina scans, iris scans, palm scans (also known as palm
               topography or palm geography), hand geometry, and voice patterns.

               Behavioral biometric methods include signature dynamics and
               keystroke patterns (keystroke dynamics). These are sometimes
               referred to as something-you-do authentication.

               Fingerprints Fingerprints are the visible patterns on the fingers and
               thumbs of people. They are unique to an individual and have been
               used for decades in physical security for identification. Fingerprint

               readers are now commonly used on laptop computers and USB flash
               drives as a method of identification and authentication.

               Face Scans Face scans use the geometric patterns of faces for
               detection and recognition. Facebook has been using facial recognition
               software for years to provide tag suggestions. For example, if a picture
               of yourself combined with your name exists on Facebook (such as in
               your profile picture), it can use this information to identify you. It

               scans newly posted pictures and provides tag suggestions (the name of
               the person in the picture). Every time someone tags you in a photo, it
               provides more information for Facebook to correctly identify you the
               next time your picture is posted. Facebook has recently started
               allowing users to unlock their account using facial recognition along
               with another authentication method. Casinos use it to identify card
               cheats. Law enforcement agencies have been using it to catch

               criminals at borders and in airports. Face scans are also used to
               identify and authenticate people before accessing secure spaces such
               as a secure vault.

               Retina Scans Retina scans focus on the pattern of blood vessels at
               the back of the eye. They are the most accurate form of biometric
               authentication and can differentiate between identical twins. However,
               some privacy proponents object to their use because they can reveal

               medical conditions, such as high blood pressure and pregnancy. Older
               retinal scans blew a puff of air into the user’s eye, but newer ones
               typically use an infrared light instead. Additionally, retina scanners
               typically require users to be as close as three inches from the scanner.

               Iris Scans Focusing on the colored area around the pupil, iris scans
               are the second most accurate form of biometric authentication. Like
   969   970   971   972   973   974   975   976   977   978   979