Cyber Security through Facial Biometric System

Verified

Added on  2023/01/18

|10
|887
|52
Presentation
AI Summary
This presentation discusses the use of facial biometric system in cyber security. It explains what facial biometric system is, how it works, and its advantages and disadvantages. The presentation also covers the pillars of cyber security and the elements of cyber security. References are provided for further reading.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber security through facial biometric system

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
What is Cyber-security?
The technology which is designed to protect
devices, data or programs from any
unauthorized access is known as cyber-
security. This factor is also termed as IT
security.
Document Page
Elements of Cyber
Security
The components of cyber security comprises
of following mentioned below:
Security in network
Security in applications
Safety of endpoints
Data reliability
Management of identity
Safety in database
Security in clouding
Mobile safety
Disaster rehabilitation
Education up to end point
Document Page
Pillars of Cyber Security
Pillars of cyber security is classified in three categories.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Biometric System
The technology designed to verify the identification of a living
person is known as Biometric System, like a finger print or face
pattern.
Document Page
Cyber security by Facial Biometric
System
What is Facial Biometric System?
It is a system which is designed in a manner that it
verifies the person with the digital image by
comparing and analyzing the pattern.
Document Page
Working of Facial Biometric
System
The Working of facial biometrics is divided in
following steps which are mentioned below:
Step1. A picture will be captured by camera of the
device and it will be stored as default identity.
Step2. The software of device will analyze the
geometry of the face of individual. The distance
between chin and forehead is measured and
stored as detail of geometry of face.
Step3. Once the identification is made with the
stored details the individual will get access to use
the device.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Advantage and Disadvantage of
Facial Biometrics System
Advantage Disadvantage
Increase in the security level Issue with the data process
and storage
Implementation Process is
easy
Problem with the size of the
image and quality as well
It helps to find the incorrect
recognition
Effect of the camera angle.
It is totally automatic system
The frauds related with the
time will be reduced.
Document Page
References
Jang-Jaccard, J. and Nepal, S., 2014. A survey of emerging threats in
cybersecurity. Journal of Computer and System Sciences, 80(5), pp.973-993.
Schneidewind, N., 2009. Metrics for mitigating cybersecurity threats to
networks. IEEE Internet Computing, 14(1), pp.64-71.
Peng, S.Y., 2015. Cybersecurity threats and the WTO national security
exceptions. Journal of International Economic Law, 18(2), pp.449-478.
Andreasson, K.J. ed., 2011. Cybersecurity: public sector threats and responses. CRC
press.
Jain, A.K., Ross, A. and Prabhakar, S., 2004. An introduction to biometric
recognition. IEEE Transactions on circuits and systems for video technology, 14(1).
Jain, A., Hong, L. and Pankanti, S., 2000. Biometric identification. Communications of
the ACM, 43(2), pp.90-98.
Jain, A.K., Nandakumar, K. and Nagar, A., 2008. Biometric template security. EURASIP
Journal on advances in signal processing, 2008, p.113.
Prabhakar, S., Pankanti, S. and Jain, A.K., 2003. Biometric recognition: Security and
privacy concerns. IEEE security & privacy, (2), pp.33-42.
Bonsor, K. and Johnson, R., 2001. How facial recognition systems
work. HowStuffWorks. com. Np, 4.
Meenakshi, M., 2013. Real-Time Facial Recognition System—Design, Implementation
and Validation. Journal of Signal Processing Theory and Applications, 1, pp.1-18.
Document Page
Lawton, G., 1998. Biometrics: a new era in
security. Computer, (8), pp.16-18.
Xiao, Q. and Yang, X.D., 2009, March. A facial presence
monitoring system for information security. In 2009 IEEE
Workshop on Computational Intelligence in Biometrics:
Theory, Algorithms, and Applications (pp. 69-76). IEEE.
Jain, A.K. and Kumar, A., 2012. Biometric recognition: an
overview. In Second generation biometrics: The ethical,
legal and social context (pp. 49-79). Springer, Dordrecht.
Andreasson, K.J. ed., 2011. Cybersecurity: public sector
threats and responses. CRC press.
Kemmerer, R.A., 2003, May. Cybersecurity. In Proceedings
of the 25th international conference on Software
engineering (pp. 705-715). IEEE Computer Society.
Mackey, T.K. and Nayyar, G., 2016. Digital danger: a
review of the global public health, patient safety and
cybersecurity threats posed by illicit online
pharmacies. British medical bulletin, 118(1), pp.110-126.
Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014.
Classification of security threats in information
systems. Procedia Computer Science, 32, pp.489-496.
Nolan, A., 2015. Cybersecurity and information sharing:
Legal challenges and solutions. Congressional Research
Service.
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]