SlideShare a Scribd company logo
1 of 10
Download to read offline
ecurityand cyber siometricB
‫المتدرب‬/‫مده‬ ‫إيهاب‬-438138062
‫م‬ /‫المقرر‬ ‫مدرب‬‫العدي‬ ‫.ابراهيم‬‫ني‬
Introduction
Computers play an important role in our daily lives and their
use has grown today. With continuous increase
Request security regulations around the world and a large
number of services are provided using the Internet in the day
To daily life, ensuring security associated with such services
has become a critical issue. Biometrics are the key
Future data / cybersecurity. This research provides a
biometric data recognition system that can be included
In any system involves access control, e-commerce, online
banking, login to the computer etc. to enhance security.
Fingerprint is an old and mature technique used in this work
as a biological advantage. In this research
Fingerprint recognition system, facial recognition system and
eye recognition system
Biomarkers are a process used to identify or document an
individual using any physical or behavioral characteristics.
These characteristics can include - but are not limited to -
fingerprints, hand shape, retina scan, iris, face mapping,
signature or writing method, and recently DNA maps.
While relatively new, biometrics is rapidly advancing and
growing in acceptance and use. Biometrics is used by
governments for passports, airports and site securities.
Fingerprints and DNA are used by policing agencies for
forensic and identification purposes. Disney World uses
fingerprint scanners at the entrance of is theme parks for
season pass holders and resort guests. Casinos use face
recognition technology to detect known scam artists.
But with any new technology comes peril amid its promise,
and biometrics is no exception. The same biometric methods
that an organization employs for greater security can be
turned against them by intruders. If risk managers are to
realize the full potential of biometrics, they must learn its
vulnerabilities and how to use this tool with risk management
in mind.
For risk managers, the importance of this emerging
technology does not necessarily lie in learning the intricacies
of how biometric science works, but in exploring the
management of the exposures biometrics present to
individuals, businesses and governments. This process begins
with identifying the cyber-risk exposures that biometrics
makes possible.
System vulnerability. Weak points in cyber-systems are
identified in various internal network entry points and
integral components such as workstations, employee
awareness, servers, databases, mainframes, mobile users and
remote users. In addition, external network influences that
pose weak points include vendors, customers and partners.
System circumvention. This involves using systems in ways
they were not intended. For example, hackers can gain access
to a system using hardware and software weaknesses. Once a
system's weakness has been found, it gives intruders the
ability to use, sell, alter or destroy the data stored on it. The
weakness could be from inadequate network security, or
leaked or stolen passwords. Hackers may include terrorists,
stalkers, abusive ex-spouses, blackmailers or organized crime.
There is no single profile that encompasses all hackers, either
by the methods they use or by their motives for invading data
systems.
Verification fraud. Circumvention of the system during the
process of verification itself can be achieved in a number of
ways. A perpetrator may be able to force an individual with
registered biometrics to provide his biometric sample (i.e.,
fingerprint, iris scan, etc.) enabling entry to the network. Or
on a more grisly note, an amputated finger or hand could be
applied to a scanner.
Facsimiles of the actual biometric could allow unauthorired
access into a system. For example, the employment of a
digitally copied iris printed on a contact lens and applied to
the eye of a perpetrator could fool an iris scanning system
into allowing entry.
A "hill climbing attack" employs a pattern recognition method
that allows for guessing the reference data
For example
There is a system of identification of the retina is now used in
several places in the government departments, airports, banks,
passports and hospitals, and works in the following way
Iris Recognition It is a biometric identification method that
works with mathematical pattern-recognition techniques on
video images. The complex metrics of this identification
system are unique, fast and stable compare to other
modalities.
Why use biometrics?
There are more people on Earth than ever before, owning
more things, and swapping more information every single
day. Security has never been more important but—ironically,
thanks to the computing power at everyone's disposal—never
easier to crack. Traditionally, security relies on things that are
difficult to do quickly: locks are physically difficult to bust
open without the correct metal keys, while information
secured by encryption (computerized scrambling) is hard to
access without the right mathematical keys. But this kind of
security has a basic flaw: with the right key, even the wrong
person can quickly gain access.
Most security experts think biometrics (body measurement) is
the answer. Instead of restricting access to things through
arbitrary locks and keys, we grant access to people if we can
positively identify them by measuring some unique pattern on
their body. If you think about it, an ordinary passport photo is
a crude example of biometrics. When the border guards look
at your face and compare it with your passport photo, what
they're doing is intuitively comparing two images. Is one nose
bigger than another? Are the eyes further apart? That's simple
biometrics. The trouble is that our faces change all the time
and lots of people look very similar. Fingerprints are a more
reliable form of biometrics, but even they're not infallible:
illnesses and injuries, as well as basic wear-and-tear, can alter
the pattern of ridges on our fingers in time. Iris scans are a
much more reliable way of identifying people—simplying by
taking quick photographs of their eyes
Start using biometrics and where to get
Since 1800 fingerprint information has been collected from
human fingers and hands through ink and paper. For the
purposes of this document, the term "footprint" is used to
mean the details of the skin surface friction layer of a part of
the hand, such as a single fingerprint or the entire hand.
Fingerprints are an example of biometrics that can be used to
identify individuals. Other biometrics that are used to identify
individuals are hand, sound, iris, retina and facial
characteristics.
In recent years, many electronic fingerprint scanning systems
have been developed using optical methods, capacitance,
direct pressure, thermal methods and ultrasound. Ultrasound-
based methods have proved to be extremely accurate, as they
are isolated from the effects of grease, dirt, paint, ink and
other image contaminants. Fingerprint scanning systems now
appear in places where ink and paper selection methods are
not desirable. Because fingerprint scanners are easy to use
and do not leave a messy mark on the person being identified,
fingerprint scanners are used to identify individuals in many
situations. For example, it is now common to find biological
scanners used in security systems to identify authorized
personnel. Some of these security systems determine
whether an individual is authorized to enter a building by
scanning the individual's fingerprint for a biometric sample,
and then comparing the biometric sample with the fingerprint
samples stored in a database that are known to come from
authorized individuals. When a matching sample is found in
the database, an individual may be allowed into the building.
In order to allow greater use of biometric scanners, biopsies
should often be installed in new or existing facilities. There is
a need to prevent the removal of the biometric scanner from
the installation. Thus, a biometric security system is needed
that can be installed on new or existing facilities
Conclusion
This research introduces fingerprint recognition, facial
recognition and eye recognition
Which can be used for computer login, access control,
Internet
Banking or other applications where security is a concern.
Biometrics are used effectively as a safeguard against
Cyber Crime. In this work fingerprint recognition system and
others
Developed and linked to electronic services to increase the
degree of protection and safety
Especially the difficulty of forging these fingerprints
References
https://www.cnahardy.com/news-and-
insight/insights/english/cyber-securit-the-future-risk-of-
biometric-data-theft
https://www.cl.cam.ac.uk/~jgd1000/iris_recognition.html
http://www.toyonway.com/en/col.jsp?id=347&gclid=EAIaIQo
bChMI_KGQ3vCy4wIVhTXTCh2KRwuJEAAYASAAEgIbXPD_BwE
https://www.androidauthority.com/how-fingerprint-
scanners-work-670934/
https://link.springer.com/book/10.1007%2F978-3-319-47301-
7

More Related Content

What's hot

Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.pptpalsantosh
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEArab Federation for Digital Economy
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?Kavika Roy
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technologypalsantosh
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methodsRupinder Saini
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...Raghavendra DC
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
Biometric Recognition for Authentication, BSides Austin, May 2017
Biometric Recognition for Authentication, BSides Austin, May 2017Biometric Recognition for Authentication, BSides Austin, May 2017
Biometric Recognition for Authentication, BSides Austin, May 2017Clare Nelson, CISSP, CIPP-E
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYsathish sak
 

What's hot (20)

Biometric of technology.ppt
Biometric of technology.pptBiometric of technology.ppt
Biometric of technology.ppt
 
Iris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAEIris recognition and the challenge of homeland & border control security in UAE
Iris recognition and the challenge of homeland & border control security in UAE
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Biometrics
BiometricsBiometrics
Biometrics
 
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Starts
Biometrics StartsBiometrics Starts
Biometrics Starts
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Seminar
SeminarSeminar
Seminar
 
Comparison of various Biometric methods
Comparison of various Biometric methodsComparison of various Biometric methods
Comparison of various Biometric methods
 
Design and development of dorsal hand vein recognition biometric system usin...
Design and development of dorsal hand vein recognition  biometric system usin...Design and development of dorsal hand vein recognition  biometric system usin...
Design and development of dorsal hand vein recognition biometric system usin...
 
sistemponto
sistempontosistemponto
sistemponto
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
Biometric Recognition for Authentication, BSides Austin, May 2017
Biometric Recognition for Authentication, BSides Austin, May 2017Biometric Recognition for Authentication, BSides Austin, May 2017
Biometric Recognition for Authentication, BSides Austin, May 2017
 
Biometrics present
Biometrics presentBiometrics present
Biometrics present
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
BIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGYBIOMETRICS FINGER PRINT TECHNOLOGY
BIOMETRICS FINGER PRINT TECHNOLOGY
 

Similar to Cybersecurity and Biometrics

Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Biometric Access Control Systems
Biometric Access Control SystemsBiometric Access Control Systems
Biometric Access Control SystemsSafe-Systems Inc.
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication systemManoj Kumar
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)JIEMS Akkalkuwa
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxdanas19
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometricsijbuiiir1
 
Parts of body for biometric security systems
Parts of body for biometric security systemsParts of body for biometric security systems
Parts of body for biometric security systemsnishiyath
 
Biometrics
BiometricsBiometrics
BiometricsN/A
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)sachin yadav
 

Similar to Cybersecurity and Biometrics (20)

Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Biometric Access Control Systems
Biometric Access Control SystemsBiometric Access Control Systems
Biometric Access Control Systems
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Bio Metrics
Bio MetricsBio Metrics
Bio Metrics
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometrics
BiometricsBiometrics
Biometrics
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication system
Biometric authentication systemBiometric authentication system
Biometric authentication system
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Recognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docxRecognizing  the fact usernames passwords are the weakest link in an.docx
Recognizing  the fact usernames passwords are the weakest link in an.docx
 
Facial Feature Recognition Using Biometrics
Facial Feature Recognition Using BiometricsFacial Feature Recognition Using Biometrics
Facial Feature Recognition Using Biometrics
 
Parts of body for biometric security systems
Parts of body for biometric security systemsParts of body for biometric security systems
Parts of body for biometric security systems
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
 
Ai
AiAi
Ai
 

Recently uploaded

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

Cybersecurity and Biometrics

  • 1. ecurityand cyber siometricB ‫المتدرب‬/‫مده‬ ‫إيهاب‬-438138062 ‫م‬ /‫المقرر‬ ‫مدرب‬‫العدي‬ ‫.ابراهيم‬‫ني‬
  • 2. Introduction Computers play an important role in our daily lives and their use has grown today. With continuous increase Request security regulations around the world and a large number of services are provided using the Internet in the day To daily life, ensuring security associated with such services has become a critical issue. Biometrics are the key Future data / cybersecurity. This research provides a biometric data recognition system that can be included In any system involves access control, e-commerce, online banking, login to the computer etc. to enhance security. Fingerprint is an old and mature technique used in this work as a biological advantage. In this research Fingerprint recognition system, facial recognition system and eye recognition system
  • 3. Biomarkers are a process used to identify or document an individual using any physical or behavioral characteristics. These characteristics can include - but are not limited to - fingerprints, hand shape, retina scan, iris, face mapping, signature or writing method, and recently DNA maps. While relatively new, biometrics is rapidly advancing and growing in acceptance and use. Biometrics is used by governments for passports, airports and site securities. Fingerprints and DNA are used by policing agencies for forensic and identification purposes. Disney World uses fingerprint scanners at the entrance of is theme parks for season pass holders and resort guests. Casinos use face recognition technology to detect known scam artists. But with any new technology comes peril amid its promise, and biometrics is no exception. The same biometric methods that an organization employs for greater security can be turned against them by intruders. If risk managers are to realize the full potential of biometrics, they must learn its vulnerabilities and how to use this tool with risk management in mind. For risk managers, the importance of this emerging technology does not necessarily lie in learning the intricacies of how biometric science works, but in exploring the management of the exposures biometrics present to individuals, businesses and governments. This process begins with identifying the cyber-risk exposures that biometrics makes possible. System vulnerability. Weak points in cyber-systems are identified in various internal network entry points and integral components such as workstations, employee awareness, servers, databases, mainframes, mobile users and
  • 4. remote users. In addition, external network influences that pose weak points include vendors, customers and partners. System circumvention. This involves using systems in ways they were not intended. For example, hackers can gain access to a system using hardware and software weaknesses. Once a system's weakness has been found, it gives intruders the ability to use, sell, alter or destroy the data stored on it. The weakness could be from inadequate network security, or leaked or stolen passwords. Hackers may include terrorists, stalkers, abusive ex-spouses, blackmailers or organized crime. There is no single profile that encompasses all hackers, either by the methods they use or by their motives for invading data systems. Verification fraud. Circumvention of the system during the process of verification itself can be achieved in a number of ways. A perpetrator may be able to force an individual with registered biometrics to provide his biometric sample (i.e., fingerprint, iris scan, etc.) enabling entry to the network. Or on a more grisly note, an amputated finger or hand could be applied to a scanner. Facsimiles of the actual biometric could allow unauthorired access into a system. For example, the employment of a digitally copied iris printed on a contact lens and applied to the eye of a perpetrator could fool an iris scanning system into allowing entry. A "hill climbing attack" employs a pattern recognition method that allows for guessing the reference data
  • 5. For example There is a system of identification of the retina is now used in several places in the government departments, airports, banks, passports and hospitals, and works in the following way Iris Recognition It is a biometric identification method that works with mathematical pattern-recognition techniques on video images. The complex metrics of this identification system are unique, fast and stable compare to other modalities.
  • 6. Why use biometrics? There are more people on Earth than ever before, owning more things, and swapping more information every single day. Security has never been more important but—ironically, thanks to the computing power at everyone's disposal—never easier to crack. Traditionally, security relies on things that are difficult to do quickly: locks are physically difficult to bust open without the correct metal keys, while information secured by encryption (computerized scrambling) is hard to access without the right mathematical keys. But this kind of security has a basic flaw: with the right key, even the wrong person can quickly gain access. Most security experts think biometrics (body measurement) is the answer. Instead of restricting access to things through arbitrary locks and keys, we grant access to people if we can positively identify them by measuring some unique pattern on their body. If you think about it, an ordinary passport photo is a crude example of biometrics. When the border guards look at your face and compare it with your passport photo, what they're doing is intuitively comparing two images. Is one nose bigger than another? Are the eyes further apart? That's simple biometrics. The trouble is that our faces change all the time and lots of people look very similar. Fingerprints are a more reliable form of biometrics, but even they're not infallible: illnesses and injuries, as well as basic wear-and-tear, can alter the pattern of ridges on our fingers in time. Iris scans are a much more reliable way of identifying people—simplying by taking quick photographs of their eyes
  • 7. Start using biometrics and where to get Since 1800 fingerprint information has been collected from human fingers and hands through ink and paper. For the purposes of this document, the term "footprint" is used to mean the details of the skin surface friction layer of a part of the hand, such as a single fingerprint or the entire hand. Fingerprints are an example of biometrics that can be used to identify individuals. Other biometrics that are used to identify individuals are hand, sound, iris, retina and facial characteristics. In recent years, many electronic fingerprint scanning systems have been developed using optical methods, capacitance, direct pressure, thermal methods and ultrasound. Ultrasound- based methods have proved to be extremely accurate, as they are isolated from the effects of grease, dirt, paint, ink and other image contaminants. Fingerprint scanning systems now appear in places where ink and paper selection methods are not desirable. Because fingerprint scanners are easy to use and do not leave a messy mark on the person being identified, fingerprint scanners are used to identify individuals in many situations. For example, it is now common to find biological scanners used in security systems to identify authorized personnel. Some of these security systems determine whether an individual is authorized to enter a building by scanning the individual's fingerprint for a biometric sample, and then comparing the biometric sample with the fingerprint samples stored in a database that are known to come from authorized individuals. When a matching sample is found in the database, an individual may be allowed into the building.
  • 8. In order to allow greater use of biometric scanners, biopsies should often be installed in new or existing facilities. There is a need to prevent the removal of the biometric scanner from the installation. Thus, a biometric security system is needed that can be installed on new or existing facilities
  • 9. Conclusion This research introduces fingerprint recognition, facial recognition and eye recognition Which can be used for computer login, access control, Internet Banking or other applications where security is a concern. Biometrics are used effectively as a safeguard against Cyber Crime. In this work fingerprint recognition system and others Developed and linked to electronic services to increase the degree of protection and safety Especially the difficulty of forging these fingerprints