CSCI 4531 Lecture Notes - Lecture 7: Computer Security, Mandatory Access Control, Eeprom
Document Summary
10/11/2016 - chapter 3 (cont"d) & chapter 4: access control. Can store but do not process data. The most common is the magnetic stripe card. Can be used alone for physical access. Provides significantly greater security when combined with with a password or. A smart token that looks like a bank card. Can look like calculators, keys, small portable objects. Manual interfaces include a keypad and display for interaction. Electronic interfaces communicate with a compatible reader / writer. Most important category of a smart token. May use any of the smart token protocols. Stores data that does not change during the card"s life. Holds temporary data generated when applications are executed. Attempts to authenticate an individual based on unique physical characteristics. Is technically complex and expensive when compared to passwords and tokens. Diagrams in slides about biometrics and how they work. Authentication over a network, the internet, or a communications link is more complex.