16.6 Summary
Biometrics is becoming a more accepted and reliable form of controlling access to physical areas and logical access to information systems and information. Such biometric systems as facial, fingerprints, iris, hand geometry and speech analyses are just some of the methods being used or under development. However, such devices have some risks: Physical, technical, human, theoretical and accidental.
Weapons, such as the EMP-based and HERF guns, are developed to attack information systems, while TEMPEST-based activities are available to steal sensitive information from adversaries and competitors.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this chapter
Cite this chapter
(2006). IA Technology Security. In: Information Assurance. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/1-84628-489-9_16
Download citation
DOI: https://doi.org/10.1007/1-84628-489-9_16
Publisher Name: Springer, London
Print ISBN: 978-1-84628-266-9
Online ISBN: 978-1-84628-489-2
eBook Packages: Computer ScienceComputer Science (R0)