Computer Science. The English Language Perspective - Беликова (1176925), страница 29
Текст из файла (страница 29)
Answer the following questions:1. How can management contribute to the development ofthe security policy?2. What are good security practices for the users?3. What are the advantages of a one-time password?4. How can the authenticity of data be protected?5. What is a checksum for?3. Translate into English:Меры по защите.1) Установите файрволл (firewall).2) Установитеантивирусное и антишпионское ПО. Антивирусное ПО171должно запускаться автоматически при загрузке Windows иработатьпостоянно,проверяязапускаемыевамипрограммы в фоновом режиме.
Обязательно проверяйте навирусы перед первым запуском любые программы,которые вы где-либо скачиваете или покупаете. 3) Неустанавливайте или удалите лишние ненужные службыWindows, которые не используете. Это ограничитвозможности хакеров по доступу к вашему компьютеру. 4)Не открывайте подозрительные письма странногопроисхождения, не поддавайтесь на содержащиеся в нихсомнительные предложения лёгкого заработка, невысылайте никому пароли от ваших аккаунтов, неоткрывайте прикреплённые к письмам подозрительныефайлы и не переходите по содержащимся в нихподозрительным ссылкам. 5) Не используйте простыепароли.
Не используйте один и тот же пароль на все случаижизни. 6) Будьте осторожны при выходе в Интернет измест общего пользования (например, Интернет-кафе), атакже при использовании прокси-серверов. Пароли,который вы вводите, в этом случае, с большейвероятностью могут быть украдены. 7) При использованииэлектронных платёжных систем типа webmoney илиЯндекс-деньги, работа с ними через веб-интерфейсявляется менее безопасной, чем если вы скачаете иустановите специальную программу (webmoney keeper).4. Give the summary of the text using the key terms.BIOMETRIC SECURITY TECHNOLOGYRead the following words and word combinations and usethem for understanding and translation of the text:to forge - подделатьretina - сетчатка172iris — радужка (глаза)gait - походкаmoire fringe patterns — интерференционный муарultrasonics — ультразвуковое излучениеoptical coupler — оптический разветвительpupil - зрачокtemplate-matching — сравнение с шаблонамиscam artist - аферистfrequent-flyer — постоянный авиапассажирlock-down — запор, блокировкаsensitive data — уязвимые данныеto enlist — включить в списокcovert surveillance — скрытое наблюдениеtemplate - шаблонBiometrics is gaining increasing attention these days.
Securitysystems, having realized the value of biometrics, use biometricsfor two basic purposes: to verify or identify users. There are anumber of biometrics and different applications need differentbiometrics.Biometric is the most secure and convenient authentication tool.It can not be borrowed, stolen, or forgotten and forging one ispractically impossible. Biometrics measure individual's uniquephysical or behavioral characteristics to recognize orauthenticate their identity.
Common physical biometricsinclude fingerprints, hand or palm geometry, retina, iris, andfacial characteristics. Behavioral characters characteristicsinclude signature, voice, keystroke pattern, and gait. Of thisclass of biometrics, technologies for signature and voice are themost developed.There are many biometric technologies to suit different types ofapplications.
Here comes a list of biometrics:Fingerprints - A fingerprint looks at the patterns found on afingertip. There are a variety of approaches to fingerprintverification, such as traditional police method, using patternmatching devices, and things like moire fringe patterns and173ultrasonics. This seems to be a very good choice for in-housesystems.Hand geometry. This involves analyzing and measuring theshape of the hand. It might be suitable where there are moreusers or where users access the system infrequently.
Accuracycan be very high if desired, and flexible performance tuningand configuration can accommodate a wide range ofapplications. Organizations are using hand geometry readers invarious scenarios, including time and attendance recording.Retina. A retina-based biometric involves analyzing the layer ofblood vessels situated at the back of the eye. This techniqueinvolves using a low intensity light source through an opticalcoupler to scan the unique patterns of the retina.
Retinalscanning can be quite accurate but does require the user to lookinto a receptacle and focus on a given point.Iris. An iris-based biometric involves analyzing features foundin the colored ring of tissue that surrounds the pupil. This usesa fairly conventional camera element and requires no closecontact between the user and the reader. Further, it has thepotential for higher than average template-matchingperformance.Face. Face recognition analyses facial characteristics. It requiresa digital camera to develop a facial image of the user forauthentication.
Because facial scanning needs extra peripheralthings that are not included in basic PCs, it is more of a nichemarket for network authentication. However, the casinoindustry has capitalized on this technology to create a facialdatabase of scam artists for quick detection by securitypersonnel.Signature. Signature verification analyses the way user signshis name. Signing features such as speed, velocity, and pressureare as important as the finished signature's static shape.
Peopleare used to signatures as a means of transaction-related identityverification.Voice. Voice authentication is based on voice-to-printauthentication, where complex technology transforms voice174into text. Voice biometrics requires a microphone, which isavailable with PCs nowadays.
Voice biometrics is to replace thecurrently used methods, such as PINs, passwords, or accountnames. But voice will be a complementary technique for fingerscan technology as many people see finger scanning as a higherauthentication form.Uses of BiometricsFor decades, many highly secure environments have usedbiometric technology for entry access. Today, the primaryapplication of biometrics is in physical security: to controlaccess to secure locations (rooms or buildings). Biometricspermit unmanned access control. Biometric devices, typicallyhand geometry readers, are in office buildings, hospitals,casinos, health clubs and lodges.
Biometrics are useful for highvolume access control. There are several promising prototypebiometric applications. One of them, EyeTicket, links apassenger's frequent-flyer number to an iris scan. Some of theUS airports use a sort of hand geometry biometric technologyfor performing citizen-verification functions.It is also expected that virtual access is the application that willmove biometrics for network and computer access. Physicallock-downs can protect hardware, and passwords are currentlythe most popular way to protect data on a network.
Biometricscan increase a company's ability to protect its sensitive data byimplementing a more secure key than a password. Usingbiometrics also allows a hierarchical structure of dataprotection, making the data even more secure. Biometrictechnologies further help to enhance security levels of access tonetwork data.E-commerce developers are exploring the use of biometrics andsmart cards to more accurately verify a trading party's identity.Banks are bound to use this combination to better authenticatecustomers and ensure non-repudiation of online banking,trading and purchasing transactions.
Point-of-sales (POS)system vendors are working on the cardholder verificationmethod, which would enlist smart cards and biometrics to175replace signature verification. Biometrics can help to obtainsecure services over the telephone through voiceauthentication..The last interesting application is for covert surveillance.
Usingfacial and body recognition technologies, researchers hope touse biometrics to automatically identify known suspectsentering buildings or traversing crowded security areas such asairports.Future Research DirectionsAlthough companies are using biometrics for authentication ina variety of situations, biometric technologies are evolving andemerging towards a large scale of use. Standards are comingout to provide a common software interface to allow sharing ofbiometric templates and to permit effective comparison andevaluation of different biometric technologies.
One of them isthe Common Biometric Exchange File Format, which defines acommon means of exchanging and storing templates collectedfrom a variety of biometric devices.Biometric assurance - confidence that a biometric can achievethe intended level of security - is another active research area.Another interesting thing to be examined is combiningbiometrics with smart cards and public-key infrastructure(PKI). A major problem with biometrics is how and where tostore the user's template. Because the template represents theuser's personal characters, its storage introduces privacyconcerns.