Page 974 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 974
scans, retina scans, iris scans, palm scans (also known as palm
topography or palm geography), hand geometry, and voice patterns.
Behavioral biometric methods include signature dynamics and
keystroke patterns (keystroke dynamics). These are sometimes
referred to as something-you-do authentication.
Fingerprints Fingerprints are the visible patterns on the fingers and
thumbs of people. They are unique to an individual and have been
used for decades in physical security for identification. Fingerprint
readers are now commonly used on laptop computers and USB flash
drives as a method of identification and authentication.
Face Scans Face scans use the geometric patterns of faces for
detection and recognition. Facebook has been using facial recognition
software for years to provide tag suggestions. For example, if a picture
of yourself combined with your name exists on Facebook (such as in
your profile picture), it can use this information to identify you. It
scans newly posted pictures and provides tag suggestions (the name of
the person in the picture). Every time someone tags you in a photo, it
provides more information for Facebook to correctly identify you the
next time your picture is posted. Facebook has recently started
allowing users to unlock their account using facial recognition along
with another authentication method. Casinos use it to identify card
cheats. Law enforcement agencies have been using it to catch
criminals at borders and in airports. Face scans are also used to
identify and authenticate people before accessing secure spaces such
as a secure vault.
Retina Scans Retina scans focus on the pattern of blood vessels at
the back of the eye. They are the most accurate form of biometric
authentication and can differentiate between identical twins. However,
some privacy proponents object to their use because they can reveal
medical conditions, such as high blood pressure and pregnancy. Older
retinal scans blew a puff of air into the user’s eye, but newer ones
typically use an infrared light instead. Additionally, retina scanners
typically require users to be as close as three inches from the scanner.
Iris Scans Focusing on the colored area around the pupil, iris scans
are the second most accurate form of biometric authentication. Like

