Copyright Goodheart-Willcox Co., Inc. 479 Chapter 15 Network Security be upset. Th e network administrator could trace the event to a specifi c workstation using a standard event-monitoring utility. Th at employee would then have to explain this incident and hope his or her job can be saved in the process. Any devices used, such as alarms or cameras, would also have to have tamper protection. Th is allows you to detect and prevent attempts to manipulate or disable your security measures. Beyond technological measures, security guards and em- ployee name badges can be very helpful in securing a facility. Locks, including those with passcodes that record who went through the door, are excellent physical secu- rity measures. Key fobs can also be helpful, especially when used with smart locks. Biometrics Biometrics is the science of using unique physical features of a person to confi rm that person’s identifi cation for authentication purposes. Some examples of unique physical features include fi ngerprints, speech, eye color patterns, and facial features. One or more of these physical traits can be scanned and encoded as data to be used for comparison when a person attempts to enter a secure area. Figure 15-22 shows an example of a fi ngerprint-based biometric device. Biometrics can also be used in conjunction with traditional authentication methods, such as usernames and passwords. 4.1 NET 4.1 NET Figure 15-22 A biometric device that uses the fingerprint for authentication. Precise Biometrics It is assumed that because biometrics is unique it cannot be compromised. It is a well-known fact that even foolproof security models can be compromised. A group of college students once cracked a biometrics fi ngerprint scanner by getting a sample of a network user’s fi ngerprint from a glass. Next, they made a mold of the fi ngerprint and poured a plastic substance similar to rubber into the mold. Th ey used the rubber form of the fi ngerprint to crack a biometrics fi ngerprint scanner. As this story exem- plifi es, any security model can be broken. However, certain models are much more diffi cult to crack than others. Smart Card A smart card incorporates a special card into a security system. It is used in con- junction with a personal identifi cation number (PIN). An example of a smart card is shown in Figure 15-23. A card reader is attached to the computer system via any standard port, such as a serial or USB port. Once the smart card is inserted into the card reader, the user is prompted for a PIN. After the correct PIN is entered, access to the computer system is granted. Smart card technology is not only designed for 4.1 NET
Previous Page Next Page