SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe purpose of this paper is to provide information that will assist a biometric implementer evaluate and select biometric technology. The scope of this paper is limited to the selection of biometric technology as an authenticator in a networked environment. Biometrics as a physical access, e-commerce, and monitoring technology is beyond the scope of this paper. As a security consultant and systems integrator, I will attempt to point out the 'fine print issues' of this technology as well as dispel biometric misconceptions cover generally available biometric technology and explore selection considerations. Biometric technology has great promise and application but only as a component of an organization's overall risk management program. As with all security mechanisms and countermeasures improper selection planning and implementation will leave an organization vulnerable to threats.