Transparent User Authentication pp 3-24 | Cite as
Current Use of User Authentication
Chapter
First Online:
Abstract
Information security has become increasingly important as technology integrates into our everyday lives. In the past 10 years, computing-based technology has permeated every aspect of our lives from desktop computers, laptops and mobile phones to satellite navigation, MP3 players and game consoles. Whilst the motivation for keeping systems secure has changed from the early days of mainframe systems and the need to ensure reliable audits for accounting purposes, the underlying requirement for a high level of security has always been present.
Keywords
Information Security Intrusion Detection System Biometric System False Acceptance Rate False Rejection Rate
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
- AccessData: AccessData password recovery toolkit. AccessData. Available at: http://accessdata.com/products/forensic-investigation/decryption (2011). Accessed 10 Apr 2011
- APACS: Fraud: The facts 2008. Association for payment clearing services. Available at: http://www.cardwatch.org.uk/images/uploads/publications/Fruad%20Facts%20202008_links.pdf (2008). Accessed 10 Apr 2011
- Ashbourn, J.: Biometrics: Advanced Identity Verification: The Complete Guide. Springer, London (2000). ISBN 978-1852332433Google Scholar
- BBC: Credit card cloning. BBC inside out. Available at: http://www.bbc.co.uk/insideout/east/series3/credit_card_cloning.shtml (2003). Accessed 10 Apr 2011
- BBC: Passwords revealed by sweet deal. BBC News. Available at: http://news.bbc.co.uk/1/hi/technology/3639679.stm (2004). Accessed 10 Apr 2011
- BBC: Personal data privacy at risk. BBC News. Available at: http://news.bbc.co.uk/1/hi/business/7256440.stm (2008a). Accessed 10 Apr 2011
- BBC: Oyster card hack to be published. BBC News. Available at: http://news.bbc.co.uk/1/hi/technology/7516869.stm (2008b). Accessed 10 Apr 2011
- Clarke, N.L., Furnell, S.M.: Authentication of users on mobile telephones – A survey of attitudes and opinions. Comput. Secur. 24(7), 519–527 (2005)CrossRefGoogle Scholar
- Crown Copyright: Computer misuse act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/1990/18/contents (1990). Accessed 10 Apr 2011
- Crown Copyright: Data protection act 1988. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/1998/29/contents (1998). Accessed 10 Apr 2011
- Crown Copyright: Regulation of investigatory powers act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/2000/23/contents (2000a). Accessed 10 Apr 2011
- Crown Copyright: Electronic communication act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/2000/7/contents (2000b). Accessed 10 Apr 2011
- Crown Copyright: Police and justice act. Crown copyright. Available at: http://www.legislation.gov.uk/ukpga/2006/48/contents (2006). Accessed 10 Apr 2011
- de Winter, B.: New hack trashes London’s Oyster card. Tech world. Available at: http://news.techworld.com/security/105337/new-hack-trashes-londons-oyster-card/ (2008). Accessed 10 Apr 2011
- Deyal, G.: MiFare RFID crack more extensive than previously thought. Computer world. Available at: http://www.computerworld.com/s/article/9078038/MiFare_RFID_crack_more_extensive_than_previously_thought (2008). Accessed 10 Apr 2011
- Espiner, T.: Chip and PIN is broken, says researchers. ZDNet UK. Available at: http://www.zdnet.co.uk/news/security-threats/2010/02/11/chip-and-pin-is-broken-say-researchers-40022674/ (2010). Accessed 3 Aug 2010
- Furnell, S.M.: Computer Insecurity: Risking the System. Springer, London (2005). ISBN 978-1-85233-943-2Google Scholar
- IBG: How is biometrics defined? International Biometrics Group. Available at: http://www.biometricgroup.com/reports/public/reports/biometric_definition.html (2010a). Accessed 10 Apr 2011
- Imperva: Consumer password worst practices. Imperva Application Defense Centre. Available at: http://www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf (2010). Accessed 10 Apr 2011
- ISO: ISO/IEC 27002:2005 information technology – Security techniques – Code of practice for information security management. International Standards Organisation. Available at: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=50297 (2005a). Accessed 10 Apr 2011
- Kent, J.: Malaysia car thieves steal finger. BBC News. Available at: http://news.bbc.co.uk/1/hi/world/asia-pacific/4396831.stm (2005). Accessed 10 Apr 2011
- Kissel, B.: OpenID 2009 year in review. OpenID Foundation. Available at: http://openid.net/2009/12/16/openid-2009-year-in-review/ (2009). Accessed 10 Apr 2011
- Matsumoto, T., Matsumoto, H., Yamada, K., Hoshino, S.: Impact of artificial ‘gummy’ fingers on fingerprint systems. Proc. SPiE 4677, 275–289 (2002)Google Scholar
- Michael, S.: Facial recognition fails at Black Hat. eSecurity planet. Available at: http://www.esecurityplanet.com/trends/article.php/3805011/Facial-Recognition-Fails-at-Black-Hat.htm (2009). Accessed 10 Apr 2011
- NatWest.: The secure way to get more from online banking. NatWest Bank. Available at: http://www.natwest.com/personal/online-banking/g1/banking-safely-online/card-reader.ashx (2010). Accessed 10 Apr 2011
- Ophcrack.: What is ophcrack?. Sourceforge. Available at: http://ophcrack.sourceforge.net/ (2011). Accessed 10 Apr 2011
- Schneier, B.: Real-world passwords. Bruce Schneier Blog. Available at: http://www.schneier.com/blog/archives/2006/12/realworld_passw.html (2006). Accessed 10 Apr 2011
- Security Focus.: @Stake LC5. Security focus. Available at: http://www.securityfocus.com/tools/1005 (2010). Accessed 10 April 2011
- Wood, H.: The use of passwords for controlling the access to remote computer systems and services. In: Dinardo, C.T. (ed.) Computers and Security, vol. 3, p. 137. AFIPS Press, Montvale (1977)Google Scholar
Copyright information
© Springer-Verlag London Limited 2011