2. What are biometrics?
● Biometrics are measurable, unique physical
characteristics that are used to identify individuals.
● There are 3 types of biometrics:
○ Biological biometrics: uses traits at a
genetic/molecular level to identify individuals
(DNA/Blood).
○ Morphological biometrics: uses physical traits or
the structure of the body to identify individuals
(eyes, fingerprints, or shape of the face).
○ Behavioral biometrics: uses unique behavioral
patterns for identification (how the individual
walks/talks).
● Common biometrics:
○ Fingerprint scanning
○ Facial recognition
○ Iris recognition
○ Heart-rate sensors
○ Voice recognition
○ Hand geometry recognition
https://fcw.com/-
/media/GIG/EDIT_SHARED/Cyber/Biometrics/biometrics_shutterstoc
3. How are biometrics used in security?
● Biometric data can be used in technology in place of certain security systems.
It can also be used to enhance pre-existing security systems on phones,
computers, or even buildings.
● However, in order to be useful, this data must be permanent and able to be
collected.
○ This data is encrypted and stored either within the device or on remote
servers.
● Biometric systems consist of 3 parts:
○ The sensor: records and reads biometric information for verification of
identity
○ The computer: stores information for comparison against stored data
○ The software: links the computer hardware to the sensor to allow for data
to be collected
4. Advantages of Biometrics
● Convenience
○ Biometrics make it easier for users to access their devices or personal
information. Unlike long and complicated passwords, biometric data such
as your fingerprint cannot be lost or changed.
● Privacy
○ Since biometrics cannot be changed, the use of biometric systems ensures
that the only people that can access devices or data are the ones that have
been given access or permission to do so.
5. Disadvantages of Biometrics
● Accuracy is not Guaranteed
○ Facial recognition can be tricked. Researchers at the University of North
Carolina at Chapel Hill conducted an experiment to test five security
systems that use facial recognition software. They downloaded photos of
20 volunteers from social media and constructed 3D models of their faces.
The researchers were able to breach four out of the five systems.
○ It is also extremely easy to clone fingerprints using just plastic or candle
wax, which can be used to unlock devices.
● Software Flaws
○ Hackers could exploit any flaws in biometric system software, leaving user
data vulnerable.
○ Passwords can be changed if accounts become unprotected, but biometric
data cannot be modified.
6. Disadvantages of Biometrics
● Lack of Federal Laws
○ Currently, there aren’t any cohesive laws in the United States to protect
user’s biometric data. Hopefully, as biometrics becomes more common,
legislation will be put in place to keep this sensitive data safe.
.
7. How can you protect your data?
● It is paramount that you take the proper precautions to keep your data secure.
○ Use biometrics sparingly to keep your biometric data stored in a few
places, and opt out of biometric data collection if you want.
○ Keep the software on your devices current as it reduces the probability of
your device being vulnerable to security flaws.
○ Use two-factor authentication on accounts to add an extra layer of
protection onto your accounts (visit our Two-Factor Authentication page
for more information).