This is when a system inaccurately identifies someone as someone else. For example, imagine that Attacker Al steals Sally's laptop. The laptop has a fingerprint scanner for authentication with Sally's fingerprint. Attacker Al tries his fingerprint and it works. It accepts his fingerprint even though it shouldn't. It returns a positive match as though his fingerprint is the same as Sally's even though this is obviously false. |
ISSC Security >