IT 360 Oakland Community College Module 2 Biometric Password Authentication Paper
Description
Having Trouble Meeting Your Deadline?
Get your assignment on IT 360 Oakland Community College Module 2 Biometric Password Authentication Paper completed on time. avoid delay and – ORDER NOW
Module 2: Discussion Forum
Define the terms false match rate and false non-match rate, and explain the use of a threshold in relation to these two rates. Justify your answers. Provide examples to support your response. Specifically, think of and give a real-life scenario portraying the following concepts:
False match rate
False non-match-rate
POST 1
2 responses
1- Tanner
Hey Everyone, One source stated that a false match rate (FMR) is the rate when distinct biometric samples from different sources are identified as being from the same source (Stallings & Brown, 2014). The same source stated that a false non-match rate (FNMR) is the rate where biometric samples from the same source are identified as being from different sources.Aware (2014) states that a well-performing bioauthentication system is characterized by prompt results and low FMRs and FNMRs. The accuracy of a bioauthentication system falls on a point where the location of that point is a function of the matching threshold. One source defined threshold as a value that can decide the authenticity of a person (Malik et al, 2014). Aware (2014) further explains that in a bioauthentication system, a higher match threshold reduces false match rate, but increases false non-match rate. This suggests higher security, but less convenience. Using a phone’s facial recognition as an example, this would mean that as the threshold increases, so would the difficulty for anyone, including yourself, to get into your phone. At the same time, a lower match threshold reduces the false non-match rate, but increases false match rate. This is suggesting there is a more convenience, but lower security. Using the same example, as the threshold decreases, the opportunity for anyone to unlock your phone would increase. ReferencesAware. (2015). Biometrics Software Solutions. Aware, Inc. https://www.aware.com/ (Links to an external site.)Malik, J., Girdhar, D., Dahiya, R., & Sainarayanan, G. (2014). Reference Threshold Calculation for Biometric Authentication. International Journal of Image, Graphics and Signal Processing. https://www.researchgate.net/publication/ (Links to an external site.).Stallings, W. & Brown, L. (2014). Computer Security: Principles And Practice, Third Edition. Pearson. https://platform.virdocs.com/
2- D’vonte
Hi class,In regards to biometric authentication, there are flaws associated with it, as can be argued with other forms of authentication really. For biometrics, we have two concepts:False Match Rate – When the systems believes that the biometric data, from two different sources, is the same person.False non-match rate – When the system believes that data, or multiple captures, from a single source is in fact coming from different persons.I found that both of these terms are essentially false positives, since they’re giving approval or authentication of flawed data readings.Something that comes to mind are the biometric authentication we have on our very cellphones. There were times, whether because of a dirty screen or just an anomalous glitch, where using my fingerprint resulted in the system believing I was a different person, despite recording my thumb print a long time ago. I’d pressed it once and it’d reject me, and when I do it a few more times, it’d temporarily locked me so I’d be forced to use a password. This could be an example of a “false non-match” really.For threshold, it’s essentially how many occurrences of either matches do we want to tolerate before rejecting them completely. There have to be liberties taken or considered for convenience and security, so it entirely depends. The example of the cellphone earlier, with it temporarily locking me out, is an example of that threshold practice in place. Enough times to properly shut out my further attempts, but not enough to make a simple access of my phone completely inconvenient.
POST 2
Please pick one of them , I will need it Sunday afternoon , I will invite you whenever you are active .. Thanks Option #1: New Authentication ProposalA relatively new authentication proposal is the Secure Quick Reliable Login (SQRL). It is described at the following link:Secure Quick Reliable Login (Links to an external site.)Briefly summarize how SQRL works and indicate how it fits into the categories of types of user authentication. Provide the benefits and identify any possible security issues with SQRL.Your well-written paper should meet the following requirements:Paper length: 2-3 pagesInclude an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.Include two external references in addition to the textbook. Do not use blogs or wikis. CSU Global can help in your research. If you would like help from a CSU Global Librarian with your research skills, click here to schedule: LibGuides: Library News: Updates .Format according to the CSU Global Writing Center (Links to an external site.).Option #2: Password AuthenticationExplain why biometric authentication protocols and the biometric capture device are authenticated in the case of static biometric, but not authenticated for a dynamic biometric.Your well-written paper should meet the following requirements:Paper length: 2-3 pagesInclude an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.Include two external references in addition to the textbook. Do not use blogs or wikis. CSU Global can help in your research. If you would like help from a CSU Global Librarian with your research skills, click here to schedule: LibGuides: Library News: Updates .Format according to the CSU Global Writing Center (Links to an external site.).