December 23, 2021 by Admin
Which of the following comparisons are used for identification and authentication in a biometric system?
- One-to-many for identification and authentication
- One-to-one for identification and authentication
- One-to-many for identification and one-to-one for authentication
- One-to-one for identification and one-to-many for authentication
In identification mode the system performs a one-to-many comparison against a biometric database in attempt to establish the identity of an unknown individual. The system will succeed in identifying the individual if the comparison of the biometric sample to a template in the database falls within a previously set threshold. Identification mode can be used either for ‘positive recognition’ (so that the user does not have to provide any information about the template to be used) or for ‘negative recognition’ of the person “where the system establishes whether the person is who she (implicitly or explicitly) denies to be”
In verification (or authentication) mode the system performs a one-to-one comparison of a captured biometric with a specific template stored in a biometric database in order to verify the individual is the person they claim to be.
Management of Biometrics
Management of biometrics should address effective security for the collection, distribution and processing of biometrics data encompassing:
Data integrity, authenticity and non-repudiation
Management of biometric data across its life cycle – compromised of the enrollment, transmission and storage, verification, identification, and termination process
Usage of biometric technology, including one-to-one and one-to-many matching, for identification and authentication
Application of biometric technology for internal and external, as well as logical and physical access control
Encapsulation of biometric data
Security of the physical hardware used throughout the biometric data life cycle
Techniques for integrity and privacy protection of biometric data.
The following were incorrect answers:
All other choices presented were incorrectly describing identification and authentication mapping.
CISA review manual 2014 Page number 331