TITLE

Biometrics Are Opening Many Eyes

AUTHOR(S)
Bondar, Harvey
PUB. DATE
February 2004
SOURCE
Bank Technology News;Feb2004, Vol. 17 Issue 2, p54
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the use of fingerprinting authentication technology to eliminate the burdens of password management. Most prevalent means of authentication; Studies demonstrating the use of passwords; Password management policies; Areas within a specific financial institutions where fingerprinting is being used to elimate password headaches.
ACCESSION #
12700950

 

Related Articles

  • Password Authentication Scheme with Secured Login Interface. Akinwale, A. T.; Ibharalu, F. T. // Annals. Computer Science Series;2009, Vol. 7 Issue 2, p77 

    This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A...

  • Passwords: Do User Preferences and Website Protocols Differ From Theory? Barra, Roberta Ann; McLeod, Alexander; Savage, Arline; Simkin, Mark G. // Journal of Information Privacy & Security (Ivy League Publishing;2010, Vol. 6 Issue 4, p50 

    Despite the availability of superior authentication tools, password security continues to be an important access control in modern, computer-based systems. Are strong passwords used in these systems? Under what conditions are users willing to adopt stronger passwords? To answer these questions,...

  • Better IT security at your fingertips.  // Works Management;Dec1998, Vol. 51 Issue 12, p9 

    The article discusses the fingerprints as passwords to personal computers by the Compaq Fingerprint Identification Technology. The fingerprint identification technology works by identifying users through fingerprints instead of passwords, which could provide more security. Units are consisted of...

  • 10 Best Practices for Data Security.  // Database Trends & Applications;Mar2007, Vol. 21 Issue 3, p25 

    The article outlines 10 best practices for data security. It is suggested to tighten database and application access control. A password is strongly required to manage risk and vulnerability. The use of common databases must be avoided. All access and changes should be logged to sensitive...

  • Continuous Authentication using Biometric Keystroke Dynamics. Bours, Patrick; Barghouthi, Hafez // Norwegian Information Security Conference / Norsk Informasjonssi;Nov2009, p1 

    When talking about authentication in general and biometrics in particular, we envisage a situation where a user provides an identity and gives proof of this identity, in order to get access to certain services. This kind of authentication (called static authentication) is done when first...

  • Untitled. Ashford, Warwick // Computer Weekly;8/17/2010, p78 

    In this article the author discusses the use of passwords that dates back earlier than the mid 20th century. It reports that documented accounts of password distribution was available for the Roman military as well as Masonic scholars. It also reports that the popularity of passwords allows the...

  • Logon.  // Network Dictionary;2007, p292 

    A definition of the term "Logon" is presented. It refers to a set of authenticating credentials such as username and password submitted by an entity seeking access to a system or network.

  • One-Time Password.  // Network Dictionary;2007, p350 

    A definition of the term "one-time password" (OTP) is presented. It refers to a password authentication system that provides authentication for system access that is secure against passive attacks based on replaying captured reusable passwords. OTP can generate password randomly or based on some...

  • Tier 2 Authentication.  // Network Dictionary;2007, p487 

    A definition of the computer security term "Tier 2 Authentication" is presented. It refers to the user authentication using User Identification and Password.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics