BiometricsJ E F F VA N TA S S E L CAP 480M R S . M C C A RT HY
Problems with biometrics There are a few problems with using biometrics. “There are also devices that can capture iris images of a person walking within a few feet of a video camera (often behind a one-way mirror) so that it can be duplicated and used for illegitimate purposes. The real problem with biometrics is that once an individuals biometrics has been compromised, they are compromised for life and can never be trusted again. “(Strassmann, 2002). “However, my most severe objection to biometrics as an authentication method is their reliance on a central database that contains the identifying graphic templates. If such database is compromised, then the biometrics of ALL users in the database are compromised for life.” (Strassmann, 2002).
Solution The solution is to use another type of security along with using biometric devices. “Knowledge tokens, such as passwords, secret PINs (Personal Identification Numbers), or knowledge of personal data (knowing ones mothers maiden name, e.g.), or” Abernathy & Tien. (2003). “Physical tokens such as ID cards, passports, chip cards, or plain old keys.” Abernathy& Tien. (2003).
What are Biometrics? Firstly what are biometrics? According to the Electronic Frontier Foundation or EFF biometrics are “Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioral characteristics. Many body parts, personal characteristics and imaging methods have been suggested and used for biometric systems: fingers, hands, feet, faces, eyes, ears, teeth, veins, voices, signatures, typing styles, gaits and odors.” (Abernathy & Tien, 2003).
What are biometrics? Continued. In other words biometrics is measuring the metrics of our biological make up. They can measure many different aspects that make up our bodies. Picture taken from http://gsmtweet.com/biometric-security-fixes-and-flaws/
Types of biometric devices. The different types of biometric devices are as fallows: voice; - handwriting; - fingerprint(s); - face; - retina of the eye; - iris of the eye. And many more…
Facial Recognition Facial recognition is another biometric device that is heavily used in many different industries. It can be used to “geometrically map the face and also have a view base of the face. There are 3 algorithms that have been well studied that are used in facial recognition software; Principal Components Analysis (PCA), Linear Discriminant Analysis (LDA), and Elastic Bunch Graph Matching (EBGM).” ("Face recognition," 2006).
Pros of biometric use “With both Biometric systems, you eliminate all problems associated with „buddy punching‟, but also lost/forgotten/replacement ID cards” ("Using biometric time," ). They can also be easy to use if set up right. They can help make your network more secure.
Picture References http://www.globalsecurity.org/security/systems/biometrics-fingerprint.htm for fingerprint types http://gsmtweet.com/biometric-security-fixes-and-flaws/ for fingerprint scanner http://www.hrindustries.co.uk/biometric-solutions.htm for handprint scanner http://www.biometric-security-devices.com/biometric-scanners.html for iris scanner Gambling on research. (2008, September 18). Retrieved from http://workingstiffs.blogspot.com/2008/09/gambling-on-research.html for woma‟s face recognition Biometrics: Identifying friend or foe ( $2 million). (2010, October 5). Retrieved from http://www.nist.gov/public_affairs/factsheet/biometrics2009.cfm for man with many cameras Thesis subject: Biometric evaluation platform. (2006). Retrieved from http://www.ecole.ensicaen.fr/~elabed/recherche_en.html for mug shots.
References Abernathy, W. & Tien, L. (2003, September 14). Biometrics: Whos watching you?. Retrieved from https://www.eff.org/wp/biometrics-whos-watching-you Biometrics – problem or solution ?. (n.d.). Retrieved from http://www.articsoft.com/whitepapers/biometrics.pdf Face recognition. (2006, August 7). Retrieved from http://www.biometrics.gov/Documents/facerec.pdf Strassmann, P. (2002, April 10). Problems with authentication. Retrieved from http://www.strassmann.com/pubs/searchsecurity/2002- Using biometric time and attendance solutions. (n.d.). Retrieved from http://www.hrindustries.co.uk/biometric-solutions.htm