SlideShare a Scribd company logo
1 of 8
Biometrics in Security
Shruti Marota
What are biometrics?
● Biometrics are measurable, unique physical
characteristics that are used to identify individuals.
● There are 3 types of biometrics:
○ Biological biometrics: uses traits at a
genetic/molecular level to identify individuals
(DNA/Blood).
○ Morphological biometrics: uses physical traits or
the structure of the body to identify individuals
(eyes, fingerprints, or shape of the face).
○ Behavioral biometrics: uses unique behavioral
patterns for identification (how the individual
walks/talks).
● Common biometrics:
○ Fingerprint scanning
○ Facial recognition
○ Iris recognition
○ Heart-rate sensors
○ Voice recognition
○ Hand geometry recognition
https://fcw.com/-
/media/GIG/EDIT_SHARED/Cyber/Biometrics/biometrics_shutterstoc
How are biometrics used in security?
● Biometric data can be used in technology in place of certain security systems.
It can also be used to enhance pre-existing security systems on phones,
computers, or even buildings.
● However, in order to be useful, this data must be permanent and able to be
collected.
○ This data is encrypted and stored either within the device or on remote
servers.
● Biometric systems consist of 3 parts:
○ The sensor: records and reads biometric information for verification of
identity
○ The computer: stores information for comparison against stored data
○ The software: links the computer hardware to the sensor to allow for data
to be collected
Advantages of Biometrics
● Convenience
○ Biometrics make it easier for users to access their devices or personal
information. Unlike long and complicated passwords, biometric data such
as your fingerprint cannot be lost or changed.
● Privacy
○ Since biometrics cannot be changed, the use of biometric systems ensures
that the only people that can access devices or data are the ones that have
been given access or permission to do so.
Disadvantages of Biometrics
● Accuracy is not Guaranteed
○ Facial recognition can be tricked. Researchers at the University of North
Carolina at Chapel Hill conducted an experiment to test five security
systems that use facial recognition software. They downloaded photos of
20 volunteers from social media and constructed 3D models of their faces.
The researchers were able to breach four out of the five systems.
○ It is also extremely easy to clone fingerprints using just plastic or candle
wax, which can be used to unlock devices.
● Software Flaws
○ Hackers could exploit any flaws in biometric system software, leaving user
data vulnerable.
○ Passwords can be changed if accounts become unprotected, but biometric
data cannot be modified.
Disadvantages of Biometrics
● Lack of Federal Laws
○ Currently, there aren’t any cohesive laws in the United States to protect
user’s biometric data. Hopefully, as biometrics becomes more common,
legislation will be put in place to keep this sensitive data safe.
.
How can you protect your data?
● It is paramount that you take the proper precautions to keep your data secure.
○ Use biometrics sparingly to keep your biometric data stored in a few
places, and opt out of biometric data collection if you want.
○ Keep the software on your devices current as it reduces the probability of
your device being vulnerable to security flaws.
○ Use two-factor authentication on accounts to add an extra layer of
protection onto your accounts (visit our Two-Factor Authentication page
for more information).
Sources
● https://www.kaspersky.com/resource-center/definitions/biometrics
● https://us.norton.com/internetsecurity-iot-biometrics-how-do-they-work-are-they-
safe.html
● https://www.ifsecglobal.com/global/biometric-security-systems-guide-devices-
fingerprint-scanners-facial-recognition/
● https://blogs.thomsonreuters.com/answerson/biometrics-technology-convenience-data-
privacy/
● https://www.nedapsecurity.com/insight/biometric-security/

More Related Content

What's hot

Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshareprachi
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security SystemsSuhas Deshpande
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technologytwuniversity
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptxvineeth chepuri
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionDevyani Vaidya
 
Biometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureBiometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureMichael James
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview pptamee yaami
 

What's hot (17)

Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Biometrics For Security Systems
Biometrics For Security SystemsBiometrics For Security Systems
Biometrics For Security Systems
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Biometrics Security System
Biometrics Security SystemBiometrics Security System
Biometrics Security System
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Biometrics - Then, Now and the Future
Biometrics - Then, Now and the FutureBiometrics - Then, Now and the Future
Biometrics - Then, Now and the Future
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Biometrics overview ppt
Biometrics overview pptBiometrics overview ppt
Biometrics overview ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Similar to Biometrics in Security

Similar to Biometrics in Security (20)

Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Privacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric PatternsPrivacy & Ethics in Biometric Patterns
Privacy & Ethics in Biometric Patterns
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric Identification system.pptx
Biometric Identification system.pptxBiometric Identification system.pptx
Biometric Identification system.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Poster on biometrics
Poster on biometricsPoster on biometrics
Poster on biometrics
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)Biometrics(By Aashish Tanania)
Biometrics(By Aashish Tanania)
 
Ai
AiAi
Ai
 
Biometrics
BiometricsBiometrics
Biometrics
 
HKGCC_Luncheon_20160413
HKGCC_Luncheon_20160413HKGCC_Luncheon_20160413
HKGCC_Luncheon_20160413
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometric security tech
Biometric security techBiometric security tech
Biometric security tech
 
Biometrics poster
Biometrics posterBiometrics poster
Biometrics poster
 
A Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human RecognitionA Comparison Based Study on Biometrics for Human Recognition
A Comparison Based Study on Biometrics for Human Recognition
 

More from North Carolina State University (8)

Updating Operating Systems and Applications
Updating Operating Systems and ApplicationsUpdating Operating Systems and Applications
Updating Operating Systems and Applications
 
Ransomware and Backups
Ransomware and BackupsRansomware and Backups
Ransomware and Backups
 
Strong Passwords
Strong PasswordsStrong Passwords
Strong Passwords
 
Phishing
PhishingPhishing
Phishing
 
Scams
ScamsScams
Scams
 
Cookie
CookieCookie
Cookie
 
Cookie note
Cookie noteCookie note
Cookie note
 
Intimate Partner Violence
Intimate Partner ViolenceIntimate Partner Violence
Intimate Partner Violence
 

Recently uploaded

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 

Biometrics in Security

  • 2. What are biometrics? ● Biometrics are measurable, unique physical characteristics that are used to identify individuals. ● There are 3 types of biometrics: ○ Biological biometrics: uses traits at a genetic/molecular level to identify individuals (DNA/Blood). ○ Morphological biometrics: uses physical traits or the structure of the body to identify individuals (eyes, fingerprints, or shape of the face). ○ Behavioral biometrics: uses unique behavioral patterns for identification (how the individual walks/talks). ● Common biometrics: ○ Fingerprint scanning ○ Facial recognition ○ Iris recognition ○ Heart-rate sensors ○ Voice recognition ○ Hand geometry recognition https://fcw.com/- /media/GIG/EDIT_SHARED/Cyber/Biometrics/biometrics_shutterstoc
  • 3. How are biometrics used in security? ● Biometric data can be used in technology in place of certain security systems. It can also be used to enhance pre-existing security systems on phones, computers, or even buildings. ● However, in order to be useful, this data must be permanent and able to be collected. ○ This data is encrypted and stored either within the device or on remote servers. ● Biometric systems consist of 3 parts: ○ The sensor: records and reads biometric information for verification of identity ○ The computer: stores information for comparison against stored data ○ The software: links the computer hardware to the sensor to allow for data to be collected
  • 4. Advantages of Biometrics ● Convenience ○ Biometrics make it easier for users to access their devices or personal information. Unlike long and complicated passwords, biometric data such as your fingerprint cannot be lost or changed. ● Privacy ○ Since biometrics cannot be changed, the use of biometric systems ensures that the only people that can access devices or data are the ones that have been given access or permission to do so.
  • 5. Disadvantages of Biometrics ● Accuracy is not Guaranteed ○ Facial recognition can be tricked. Researchers at the University of North Carolina at Chapel Hill conducted an experiment to test five security systems that use facial recognition software. They downloaded photos of 20 volunteers from social media and constructed 3D models of their faces. The researchers were able to breach four out of the five systems. ○ It is also extremely easy to clone fingerprints using just plastic or candle wax, which can be used to unlock devices. ● Software Flaws ○ Hackers could exploit any flaws in biometric system software, leaving user data vulnerable. ○ Passwords can be changed if accounts become unprotected, but biometric data cannot be modified.
  • 6. Disadvantages of Biometrics ● Lack of Federal Laws ○ Currently, there aren’t any cohesive laws in the United States to protect user’s biometric data. Hopefully, as biometrics becomes more common, legislation will be put in place to keep this sensitive data safe. .
  • 7. How can you protect your data? ● It is paramount that you take the proper precautions to keep your data secure. ○ Use biometrics sparingly to keep your biometric data stored in a few places, and opt out of biometric data collection if you want. ○ Keep the software on your devices current as it reduces the probability of your device being vulnerable to security flaws. ○ Use two-factor authentication on accounts to add an extra layer of protection onto your accounts (visit our Two-Factor Authentication page for more information).
  • 8. Sources ● https://www.kaspersky.com/resource-center/definitions/biometrics ● https://us.norton.com/internetsecurity-iot-biometrics-how-do-they-work-are-they- safe.html ● https://www.ifsecglobal.com/global/biometric-security-systems-guide-devices- fingerprint-scanners-facial-recognition/ ● https://blogs.thomsonreuters.com/answerson/biometrics-technology-convenience-data- privacy/ ● https://www.nedapsecurity.com/insight/biometric-security/