10.08.2015 Views

Usability and Security

Usability and Security - Vurore

Usability and Security - Vurore

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

computer <strong>and</strong> network assets. The relatively small size <strong>and</strong> low cost allow them to be easilyincorporated into devices <strong>and</strong> are fairly reliable;• Retina: scanning involves examining the unique patterns on the back of a person’s eye. The retina isthe part of the eye that translates light into the electrical impulses sent to the brain. Because of thecomplexity of current scanners, most retina biometric devices require a relatively large footprint.Most are still used to protect fixed physical assets. Using a retina scanner is also less convenientbecause the user must position himself a certain distance away from the scanner <strong>and</strong> then rest his orher head on a support or look into a hood. This is necessary in order to effectively read the back ofthe eye;• Iris: Iris scanning is similar to retina, but the scanner is looking at the unique patterns on a person’sIris. This is the “colored” part of the eye <strong>and</strong> is visible. A key benefit for Iris over Retina is that Irisscanners do not need to be nearly as close to the eye <strong>and</strong> do not need the eye to be as preciselypositioned;• Face: recognition involves scanning the unique features of a person’s face. Because some aspectschange over time, this is a less reliable form factor. Face recognition is less attractive for up-closeverification than for long distance identification. Once a person is close enough to a physical assetin order to get a high quality biometric scan, other form factors are viable <strong>and</strong> are currently muchmore reliable.Wilson also outlines the usability (effort) <strong>and</strong> the security value for the different types of biometric formfactors 40 :Figure 3: <strong>Usability</strong> (effort) <strong>and</strong> security values3.3.4.1 Recapitulation & analysis<strong>Usability</strong> aspects:• Effectiveness: the users’ goal with effectiveness is to get access to a system or building as accurate<strong>and</strong> complete as possible. Facial recognition is still not mature enough <strong>and</strong> h<strong>and</strong>prints change overtime (e.g. juvenile finger growth). Perhaps for other form factors more effort is needed, but in thiscase we consider all types with the exception of the facial <strong>and</strong> h<strong>and</strong>print type;• Efficiency: the users’ goal with efficiency is to get access to a system or building as accurate <strong>and</strong>complete as possible, using minimal resources (e.g. time). Based on the discussions above we can21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!