In a recent article in the UK Register, several examples were discussed in possi
ID: 3729033 • Letter: I
Question
In a recent article in the UK Register, several examples were discussed in possible uses of biometrics to aid in securing various devices and accounts.
http://www.theregister.co.uk/2016/06/29/biometrics_body_of_evidence/ (Links to an external site.)Links to an external site.
Comment on one of the examples - What are your thoughts on the use of it and what challenges would a company face in implemention of the biometric? Keep in mind bio metrics require a sample and a source record to compare the sample to.
Explanation / Answer
Generally , When ever we are using a particular device or account:
Identification and authentication is required.
IDENTIFICATION:Determining if some one is known to the system.
AUTHENTICATION:Verifyimg the identity of the that person.
TRADITIONAL TECHNIQUES:
The traditional techniques we are using for authentication and identification are:
IDENTIFICTION:
-----------------------
User Name
Bank card
AUTHENTICATION
-----------------------
Password
Pincode
There are problems with the traditional techniques .they are
Username and password is NOT strong Autentication
->Just two things we know, here the problem with the things we know is:
1.making sure that no one else knows it.
2. Easy to remember passwords are easy to guess
3. Hard to guess passwords are hard to remember
->unless you write them down
->then they can be read by others
These can be stolen,can be lost and can be broken.
IN RECENT YEARS BIOMETRICS HAS BECOME AN INCREASINGLY FEASIBLE SOLUTION
Biometrics:Any human characterstic which may be used for biometric authentication and identification
The basic premise of biometric authentication is that every person can be accurately identified by his or her intrinsic physical or behavioral traits.
Biometric technology has many benifits in which they allow identification to be more accurate and personal security to be more secure due to more validation that says that the person is who they say they are.
Biometrics include:
Physiological characterstics:
-Fingerprint
-plamprint
-face
-iris
-voice
Behavioral characterstics:
-Signatures
-Guestures
-Typing
Benifits of BIOMETRICS
->user friendly systems
->Reduced fraud
->no forgotten paassword
->provide greater customer convineince than carrying cards or tokens.
->Reduced Cost
->Reduced Size
->Increased Accuracy
->increased ease of use
->Can't be lost (well not easily atleast)
->can't be guessed or read by some one else
->Difficult to uniquely identify
Applications of Biometrics:
Challenges the company would face in the implemantation of biometric:
-->Since the implementation of biometrics require personal information about its users to be collected and placed on centralized database for future use,it puts the information at risk for THEFT and MISUSE.This could loose the identity theft or misuse by institutions without the knowledge of thr person.
-->Also ethical concerns related to protection of individuals privacy,autonomy ,bodily integrity ,dignity and personal liberty
--> Often times ,Companies, who install the biometric systems and use these systems, donot think about informed consent to all the possible uses of their information,which can lead to the company being deceptive and coercing the client into giving the company their personal identity.
-->If the templates and databases which the content is stored is attacked.If the hacker is able to get into the database system or intercept biometric features when they are processed or transferred it could lead to large security crisis and multiple identity thefts.
--->the possibility of the system failing and getting hacked for the data to be intercepted and taken or manipulated and mis used
--->Not every system is built for the use of biometrics ,certain biometric systems can only be implemented in certain network systems,This leads to the limitations of use of this new secure technology ,which leaves certain netwoeks and business vulunerable to attacks
-->there are hacker group who can generate the finger prints
-->there are cases where researchers showed how hackers could exploit vulnerabilities in the android operating sytem to access the finger print sensor on phones.
To mitigate these risks, service providers should seek to incorporate technologies into their multi-factor authentication system that can provide added security and redundancy in the event of an access breach.
Companies also need to carefully consider the type of biometric technology that is appropriate for their needs.
BIOMETRICS HAS AMAZING BENIFITS BUT SOME SECURITY AND ETHICAL CONCERNS NEED TO BE ADDRESSED.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.