TITLE

It's in the Finger

AUTHOR(S)
Ting, David
PUB. DATE
October 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Oct2006, Vol. 43 Issue 10, p46
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the combination of biometrics and Enterprise Single Sign-On solutions in protecting physical and information technology-based resources from identity theft in the U.S. Most corporations implement strong multi-factor authentication policies to comply to strict mandates from government and industry regulators. Enterprise Single Sign-On solutions require a company's employees to remember and provide set of credentials to access the full portfolio of applications.
ACCESSION #
22710622

 

Related Articles

  • WOLF AT THE DOOR. Rose, Scott M. // U.S. Business Review;Jun2006, Vol. 7 Issue 6, p10 

    The article presents information on the capability of biometric solution in enhancing the performance of businesses, while doing a better job of protecting identities of companies. According to the U.S. Federal Bureau of Investigation, the stakes are increasing in identity fraud. Identity theft...

  • Future Security Approaches and Biometrics. Boukhonine, Serguei; Krotov, Vlad; Rupert, Barry // Communications of the Association for Information Systems;2005, Vol. 16, p937 

    Threats to information security are proliferating rapidly, placing demanding requirements on protecting tangible and intangible business and individual assets. Biometrics can improve security by replacing or complementing traditional security technologies. This tutorial discusses the strengths...

  • GRAND THEFT IDENTITY. Davidson, John // BRW;5/15/2008, Vol. 30 Issue 19, p74 

    The article explains how a biometric telephone can protect the owner from identity theft. According to the author, the phone has a biometric scanner which allows only the person who owns it to access the personal information it contains. The owner must first swipe his or her finger over the...

  • Getting IT Right.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p23 

    Discusses the collaboration between security and information technology (IT) executives. Purchasing of software and hardware; Mission to secure an organization's computer and information assets; Security directors' responsibility for information protection and traditional physical security;...

  • Coevolution.  // Security: Solutions for Enterprise Security Leaders;Apr2000, Vol. 37 Issue 4, p24 

    Discusses the evolution of the partnership between security system directors and information technology (IT) managers. Acceleration of technology into the security; Integration of security systems; Tools shared by IT and security; Organizations' increased demand for the seamless integration of...

  • EMPLOYERS PUNCHING IN BIOMETRIC TECHNOLOGY TO TRACK ATTENDANCE. GALE, SARAH FISTER // Workforce Management;May2013, Vol. 92 Issue 5, p14 

    The article discusses the decision of several companies in the U.S. to implement biometric time clocks. It notes that this technology uses facial recognition, fingerprint tracking or vein-pattern scanning to make it harder for hourly workers to steal company time. Featured company is the...

  • Banks Can Use Speech to Personalize Interactions. Klie, Leonard // Speech Technology Magazine;Winter2013, Vol. 18 Issue 4, p15 

    The article presents information on several speech technologies that financial institutions are currently optimizing to battle fraud and identity theft and to enhance their customer service. According to a survey conducted by information technology company Unisys, most consumers prefer voice...

  • Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Itakura, Yukio; Tsujii, Shigeo // International Journal of Information Security;2005, Vol. 4 Issue 4, p288 

    Conventional biometric authentication methods have a serious problem – it is easy to steal the biological information of another person, such as fingerprints, iris patterns, and facial forms. Accordingly, it is essential to protect authentication systems from an attack like impersonation...

  • Government tenders for ID scheme supplier. Grant, Ian // Computer Weekly;8/14/2007, p6 

    The article reports that the British government has issued a tender to run a procurement framework for the National Identity Register and the related national ID card and biometric passport, known collectively as the National Identity Scheme (NIS). Initial bids to manage the procurement...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics