Biometric Verification: "One-to-One" Search for Identity Verification | SSCP Exam Answers

One-to-One Biometric Search for Identity Verification

Prev Question Next Question

Question

In biometrics, the "one-to-one" search used to verify claim to an identity made by a person is considered:

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

Biometric devices can be use for either IDENTIFICATION or AUTHENTICATION ONE TO ONE is for AUTHENTICATION This means that you as a user would provide some biometric credential such as your fingerprint.Then they will compare the template that you have provided with the one stored in the Database.If the two are exactly the same that prove that you are who you pretend to be.

ONE TO MANY is for IDENTIFICATION A good example of this would be within airport.Many airports today have facial recognition cameras, as you walk through the airport it will take a picture of your face and then compare the template (your face) with a database full of templates and see if there is a match between your template and the ones stored in the Database.This is for IDENTIFICATION of a person.

Some additional clarification or comments that might be helpful are: Biometrics establish authentication using specific information and comparing results to expected data.

It does not perform well for identification purposes such as scanning for a person's face in a moving crowd for example.

Identification methods could include: username, user ID, account number, PIN, certificate, token, smart card, biometric device or badge.

Auditing is a process of logging or tracking what was done after the identity and authentication process is completed.

Authorization is the rights the subject is given and is performed after the identity is established.

Reference OIG (2007) p148, 167 - Authentication in biometrics is a "one-to-one" search to verify claim to an identity made by a person.

Source: KRUTZ, Ronald L.

& VINES, Russel.

D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 38.

In biometrics, the "one-to-one" search is a process used to verify a claim made by an individual to an identity. The individual provides a sample of biometric data, such as a fingerprint, which is compared to a previously recorded sample of biometric data for the same individual. This process is also known as "verification" or "authentication."

The answer to the question is A. Authentication. Authentication is the process of verifying a claim to an identity made by an individual. In biometrics, authentication is performed by comparing a sample of biometric data provided by the individual to a previously recorded sample of biometric data for the same individual. If the two samples match, the individual is considered to be authenticated or verified.

Identification, on the other hand, is the process of determining the identity of an individual based on a sample of biometric data. Identification is performed by comparing a sample of biometric data to a database of biometric data for multiple individuals in order to determine the identity of the individual who provided the sample.

Auditing is the process of recording and reviewing system activity to ensure that security policies and procedures are being followed. Auditing is typically used to detect and investigate security breaches or other unauthorized activity.

Authorization is the process of granting or denying access to resources based on an individual's identity and permissions. Authorization is typically controlled by a system administrator or security manager and is used to ensure that only authorized individuals have access to sensitive resources.