An IS auditor examining a biometric user authentication system establishes the existence of a control weakness that would allow an unauthorized individual to update the centralized database on the server that is used to store biometric templates. Ofthe following, which is the BEST control against this risk?
A.
Kerberos
B.
Vitality detection
C.
Multimodal biometrics
D.
Before-image/after-image logging
Explanation:
Kerberos is a network authentication protocol for client-server applications that can be used to restrict access to the database to authorized users. Choices B and C are incorrect because vitality detection and multimodal biometrics are controls against spoofing and mimicry attacks. Before- image/after-image logging of database transactions is a detective control, as opposed to Kerberos, which is a preventative control.