5.8: Biometric (Doshi) Flashcards

1
Q

What is biometric?

A

Biometrics refers to metrics related to a human characteristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Biometric verification

A

Any means by which a person can be uniquely identified by evaluating one or more distinguishing biological features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unique identifiers of biometric

A

palm, hand geometry, fingerprints, retina and iris patterns, voice waves and DNA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is false ACCEPTANCE with biometric

A

A rate of acceptance of unauthorized person i.e. biometric will allow a unauthorzied person to access the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Example of a false acceptance:

A

Mr. A is the only authorized person to access the system. However, if biometric allows access to Mr. B, then the same is false acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is false REJECTION with biometric?

A

A rate of rejection of authorized person(s) i.e. biometric will reject even though the person is authorized to access the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of false rejection:

A

Mr. A is the only authorized person to access the system. However, if biometric DOES NOT allow access to Mr. A, then the same is false REJECTION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cross Error Rate (CER) or Equal Error Rate (ERR):

A

It’s a rate at which FAR and FRR are equal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Characteristic of the MOST effective biometric system

A

It will have the lowest CER or ERR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Characteristic of the MOST ineffective biometric system

A

It will have the highest CER or ERR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Replay attack?

A

A biometric attack in which a residual biometric characteristic such as fingerprint left on a device is used by an attacker to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Brute force attack:

A

Involves sending the numerous different biometric samples to a biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptographic attach:

A

Targets the algorithm or the encrypted data transmitted between the biometric device and access control system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when Fale Acceptance Rate Decreases

A

False Rejection Rate Increases and vise- versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The MOST important PERFORMANCE indicator for biometric system:

A

False acceptance rate (FAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The most important OVERALL quantitative performance indicator for biometric system

A

Cross error rate CER or Equal error rate EER

17
Q

Which biometric method has the highest relibility and lowest FAR?

A

Retina Scan

18
Q

BEST performance indicator of biometrics

A

False Acceptance Rate FAR

19
Q

OVERALL BEST performance indicator of biometrics

A

Cross Error Rate CER or Equal Error Rate EER

20
Q

Mimic Attack?

A

attacker attempts to fake the biometric characteristics

21
Q

What are the 4 attacks on biometrics?

A

Mimic
Brute Force
Crypto
Replay

22
Q

In any given scenario, which biometric technology has the highest reliability and lowest false acceptance rate FAR?

A

Retina Scan

23
Q

The three MAIN accuracy measures for biometric technologies are:

A

(1) False Acceptance Rate (FAR)
(2) False Rejection Rate (FRR)
(3) Cross Error Rate (CER) or Equal Error Rate (EER)

24
Q

Data transfer of biometric data should be

A

encrypted

25
Q

Biometric life cycle is:

A

(1) enrollment
(2) transmission and storage
(3) verification
(4) identification
(5) termination of processes

26
Q

Biometric controls are more reliable than

A

forms of Access Control