Reference no: EM133049
QUESTION 1
(a) Explain the following biometric techniques:- (i) Retina scan, (ii) Fingerprint scan, (iii) Iris Scan. Your answer should consider the following: the data storage requirements of the biometric template, the biometric characteristic that differentiates them, their accuracy, the user enrolment process and their relative merits
(b) Explain what is meant by Type I error, Type II error and the cross over error rate for a biometric system. What is considered the most important error for a biometric access control system?
(c) Compare the relative merits of a network based Intrusion Detection System (IDS) and a host based IDS
(d) Which type of IDS tends to report more false positives but are able to detect new attacks?
QUESTION 2
(a) Describe in detail the functionality of the main modules of an Automated Identity and Access Management System.
(b) Explain briefly the vulnerability exploited by the following access control threats and their possible countermeasures (i) Phishing and (ii) botnets.
QUESTION 3
(a) Explain what is meant by the term ‘single sign-on' in the context of access control? Give three examples of single sign-on technologies
(b) Describe how the Kerberos authentication process work and outline the main components within the Kerberos environment, their respective functions and the level of security provided by Kerberos. Draw a diagram supporting your explanation
(c) Explain the authentication process in a synchronous token system?