Illustrate the authentication process in the synchronous token system?
Illustrate the following biometric methods:- (i) Iris scan, (ii) Finger print scan, (iii) Retina Scan and (iv) Voice Recognition. Your answer must consider the following: the data storage requirements, the biometric characteristic which discriminates them, accuracy and the user enrolment procedure.
The cost of ownership of dissimilar authentication systems varies. Give an explanation about the various costs associated with implementation of following different types of authentication system: software tokens, hardware tokens and biometrics to demonstrate the above sentence.
Illustrate out the five (5) best practices which can be executed as countermeasures against dictionary attacks.