Page 976 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 976
sometimes used as an additional authentication mechanism but is
rarely used by itself.
Speech recognition is commonly confused with voice
pattern recognition, but they are different. Speech recognition
software, such as dictation software, extracts communications
from sound. In other words, voice pattern recognition
differentiates between one voice and another for identification or
authentication, whereas speech recognition differentiates between
words within any person’s voice.
Signature Dynamics This recognizes how a subject writes a string
of characters. Signature dynamics examine both how a subject
performs the act of writing and features in a written sample. The
success of signature dynamics relies on pen pressure, stroke pattern,
stroke length, and the points in time when the pen is lifted from the
writing surface. The speed at which the written sample is created is
usually not an important factor.
Keystroke Patterns Keystroke patterns (also known as keystroke
dynamics) measure how a subject uses a keyboard by analyzing flight
time and dwell time. Flight time is how long it takes between key
presses, and dwell time is how long a key is pressed. Using keystroke
patterns is inexpensive, nonintrusive, and often transparent to the
user (for both use and enrollment). Unfortunately, keystroke patterns
are subject to wild variances. Simple changes in user behavior greatly
affect this biometric factor, such as using only one hand, being cold,
standing rather than sitting, changing keyboards, or sustaining an
injury to the hand or a finger.
The use of biometrics promises universally unique identification for
every person on the planet. Unfortunately, biometric technology has
yet to live up to this promise. However, technologies that focus on
physical characteristics are very useful for authentication.
Biometric Factor Error Ratings

