Journal #3 Extra Layer of Protection


Biometrics definition

Biometrics has the potential to make authentication dramatically faster, easier and more secure than traditional passwords, but companies need to be careful about the biometric data they collect.

Biometrics are physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data.

Biometrics can provide a reasonable level of confidence in authenticating a person with less friction for the user, it has the potential to dramatically improve enterprise security. Computers and devices can unlock automatically when they detect the fingerprints of an approved user. Server room doors can swing open when they recognize the faces of trusted system administrators. Help desk systems might automatically pull up all relevant information when they recognize an employee's voice on the support line.

Types of biometrics

Face recognition. Measures the unique patterns of a person’s face by comparing and analyzing facial contours.  It’s used in security and law enforcement but also as a way to authenticate identity and unlock devices like smartphones and laptops.

Iris recognition. Identifies the unique patterns of a person’s iris, which is the colorful area of the eye surrounding the pupil. Although widely used in security applications, it isn’t typically used in the consumer market.

Fingerprint scanner. Captures the unique pattern of ridges and valleys on a finger.  Many smartphones and some laptops use this technology as a type of password to unlock a screen.

Voice recognition.  Measures the unique sound waves in your voice as you speak to a device. Your bank may use voice recognition to verify your identity when calling about your account, or you’ll use it when giving instructions to a smart speaker like Amazon's Alexa.

Hand geometry. Measures and records the length, thickness, width, and surface area of a person’s hand. These devices date back to the 1980s and were typically used in security applications.

Behavior characteristics. Analyzes the way you interact with a computerized system. Keystrokes, handwriting, and the way you walk, how you use a mouse, and other movements can assess who you are or how familiar you are with the information you’re entering.



A biometric system consists of three different components:

Sensor. This is what records your information, as well as reads it when your biometric information needs to be recognized.

Computer. Whether you’re using your biometric information to access a computer or something else, there has to be a computer storing the information for comparison.

Software. The software is basically whatever connects the computer hardware to the sensor.

How reliable is biometric authentication?

Authentication credentials such as fingerprint scans or voice recordings can leak from devices, from company servers or from the software used to analyze them. There is also a high potential for false positives and false negatives. A facial recognition system might not recognize a user wearing makeup or glasses, or one who is sick or tired. Voices also vary.

What are the privacy risks of biometric authentication?

Some users might not want companies collecting data about, say, the time of day and the locations where they typically use their phones.  If this information gets out, it could potentially be used by stalkers or, in the case of celebrities, by tabloid journalists. Some users might not want their family members or spouses to know where they are all the time.

Are biometrics safe?

There are serious privacy concerns when it comes to biometrics. Some of the major issues identified with biometrics include these:

Any collection of data could eventually get hacked. High-profile data may be an especially attractive target for hackers. The good news is that high-profile data tends to be secured on a stronger level. However, as biometrics become more common, your biometric information will likely be available in more places which may not employ the same level of secure storage.

Biometrics may become so commonplace that people become complacent. They might not use the kind of common-sense security measures that they use today because they think that biometrics will solve all of their security problems.

The data stored in a biometric database may be more vulnerable than any other kind of data. You can change passwords. You can’t change your fingerprint or iris scan. This means that once your biometric data has been compromised, it may no longer be in your control.

Some pieces of your physical identity can be duplicated. For example, a criminal can take a high-resolution photo of your ear from afar or copy your fingerprints from a glass you leave at a cafe. This information could potentially be used to hack into your devices or accounts.

Laws governing biometrics are a work in progress, meaning your rights might be different from state to state. However, federal lawmakers may eventually create a cohesive law to address biometric privacy.

How secure is biometric authentication data?

The security of the biometric authentication data is vitally important, even more than the security of passwords, since passwords can be easily changed if they are exposed. A fingerprint or retinal scan, however, is immutable. The release of this or other biometric information could put users at permanent risk and create significant legal exposure for the company that loses the data.

Local or device-based authentication

The most common example of a local authentication mechanism is the hardware security module in a smartphone. User information — such as a fingerprint scan, facial image or a voice print — is stored inside the module. When authentication is required, biometric information is collected by the fingerprint reader, camera or microphone and sent to the module where it's compared to the original. The module tells the phone whether or not the new information is a match to what it already had stored.

Tokenization or encryption

Another approach to allowing new devices to recognize existing authorized users is tokenization, one-way encryption, or hashing functions. Say, for example, retinal, voice or fingerprint identification is used to recognize and authenticate employees wherever they might go within a company, but the company doesn't want to have the image or audio files stored on servers where hackers or malicious employees might misuse them.Biometrics definition


Source:

 What is biometrics? 10 physical and behavioral identifiers | CSO Online

Biometric Technology - an overview | ScienceDirect Topics

Biometric device - Wikipedia


Comments

Popular posts from this blog