SlideShare a Scribd company logo
Introduction

• Identifying individuals
• Using unique physical attributes
• Keeping valuables secure
Introduction

• The benefits in businesses
• Other methods aren’t as reliable
• Biometrics is the highest level of security
History of Biometrics

• Origins back to 200 BC
• Alphonse Bertillon, “Bertillonage”
• The introduction of fingerprints
History of Biometrics

• Sir Francis Galtons classification system
• The advancement of biometrics
• Biometric databases are international
Types of Biometrics

• Records basic information about user
• Sensor captures unique traits about ID
• Computer stores data for later use
Types of Biometrics
Physiological:
• Face
• Fingerprint
• Hand
• Iris
• DNA

Behavioral:
• Keystroke
• Signature
• Voice
Biometrics in the Public and Private Sector

•High Level Security and Access Control
•Traditional means are difficult to control

48%

3%
have shared passwords

left password written down
Biometrics and Consumer Application

•Eliminate concerns with identity theft
•Nobody is immune

41,496
complaints of Identity Theft
Biometrics and Consumer Application

•Ensure personal security, including:
Home
Office
Car
Financial Transactions
Personal effects (laptop, safe, etc.)
Biometrics and Consumer Application
•iPhone 5S
•New technology is currently being developed:
•Eye Verify
•Accu-Time
•Bionym
Biometrics and Practical Application

•Biometric technology on election day
•Only eligible votes cast a ballot
Biometrics and Practical Application

• NEXUS
 Program for pre-approved travelers
 Iris recognition kiosks
Biometrics and Practical Application

• Faster movement through border security
• Cost reduction for Canada Border Services
• Instructions provided to avoid error
Privacy Concerns

• Biometric information not stored on systems
• Converted into code for later use
Disadvantages

• Software and hardware failures
• User difficulties
• High start-up cost
Limitations

• Physical anomalies cause temporary difficulties
• Research will provide adaptive solutions
Conclusion

• Advantages outweigh disadvantages
• Significant return on investment
• Continued research required
Sources
Time Systems. (n.d.). Body As Credential. Retrieved October 28, 2013 from: http://www.accutime.com/Body%20As%20Credential
Apple Support. (2013). About Touch ID security. Retrieved on October 23 rd 2013 from http://support.apple.com
Applied Biometrics. (n.d.) Implementing Biometrics. Retrieved on October 20th 2013 from http://www.appliedbiometrics.co.uk
Biometrics. (n.d.). Dictionary.com Unabridged. Retrieved October 26, 2013, from
http://dictionary.reference.com/browse/biometrics
Canada Border Services Agency (n.d.). General NEXUS Questions. Retrieved on October 20 th, 2013 from http://www.cbsaasfc.gc.ca/prog/nexus/faq-eng.html
Canadian Anti-Fraud Centre Annual Statistics Report (2012). Canadian Anti-Fraud Centre. Retrieved from
http://www.antifraudcentre-centreantifraude.ca
Garrett, M. (2013, September 9). Payroll Fraud - A Big Threat and How to Avoid It. Forbes. Retrieved from www.forbes.com
Griaule Biometrics (2008). Understanding Biometrics. Retrieved from http://www.griaulebiometrics.com/enus/book/understanding-biometrics
Iritech Inc. (n.d.) Frequently Asked Questions. Retrieved on October 23rd, 2013 from www.iritech.com.
Melton, M. (2013, September 19). Can’t Afford The Biometrically Enhanced iPhone 5? Try EyeVerify!. Retrieved October 28, 2013,
from: http://www.activistpost.com/2013/09/cant-afford-biometrically-enhanced.html
Moore, G. (2009, March). History of biometrics. Retrieved from http://onin.com/fp/fphistory.html
Rubens, P. (2012, August 17). Biometric Authentication: How It Works. eSecurity Planet. Retrieved from www.esecurityplanet.com
Ruz, C. (2013, July 17). Preventing fraud in African elections. International Science Grid This Week. Retrieved from
http://www.isgtw.org
Stinson, L. (2013, September 11). This Little Wristband Will Replace Your Passwords With Your Heartbeat. Retrieved October 28,
2013 from http://www.wired.com/design/2013/09/this-little-wristband-wants-to-replace-your-passwords-and-keys-with-yourheartbeat/
Van Allen, F. (2013, August 8). Google Reveals the 10 Worst Password Ideas. Time Tech. Retrieved from http://techland.time.com
Wilson, T. (2005, November 11). How Biometrics Works. How Stuff Works. Retrieved from
science.howstuffworks.com/biometrics.htm
Zalman, A. (n.d.). History of Biometrics. About.com. Retrieved from http://terrorism.about.com/od/issuestrends/tp/History-ofBiometrics.htm

More Related Content

Viewers also liked

Social collaboration is the new competition
Social collaboration is the new competitionSocial collaboration is the new competition
Social collaboration is the new competition
Andrew Chow ✯ Keynote Speaker ✯
 
On competition chapter 7 clusters and competition
On competition chapter 7 clusters and competitionOn competition chapter 7 clusters and competition
On competition chapter 7 clusters and competitionNIDA Business School
 
Global-Arena.com The New Competition for Growth
Global-Arena.com The New Competition for GrowthGlobal-Arena.com The New Competition for Growth
Global-Arena.com The New Competition for Growth
Global-Arena.com AG
 
Biometrics Today And Into The Future (2006)
Biometrics Today And Into The Future (2006)Biometrics Today And Into The Future (2006)
Biometrics Today And Into The Future (2006)Duane Blackburn
 
Stryker (Saurabh Nigam)
Stryker (Saurabh Nigam)Stryker (Saurabh Nigam)
Stryker (Saurabh Nigam)Saurabh Nigam
 
New metaphors for competition
New metaphors for competitionNew metaphors for competition
New metaphors for competition
Ali Anani, PhD
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
Adoitya Kaila
 
Sensory Design, Embodied Cognition & The Future of Wearables
Sensory Design, Embodied Cognition & The Future of WearablesSensory Design, Embodied Cognition & The Future of Wearables
Sensory Design, Embodied Cognition & The Future of Wearables
Katja Forbes
 
The Neuroscience Information Framework:The present and future of neuroscience...
The Neuroscience Information Framework:The present and future of neuroscience...The Neuroscience Information Framework:The present and future of neuroscience...
The Neuroscience Information Framework:The present and future of neuroscience...
Neuroscience Information Framework
 
classless Kulla on Timothy Leary @ c-base
classless Kulla on Timothy Leary @ c-baseclassless Kulla on Timothy Leary @ c-base
classless Kulla on Timothy Leary @ c-base
classless
 
Nanorobotics in neurology
Nanorobotics  in neurologyNanorobotics  in neurology
Nanorobotics in neurology
Sarath Chandra
 
Neuro marketing
Neuro marketing Neuro marketing
Neuro marketing
Dr.Aravind TS
 
Transhumans: Technology Powered Superhumans
Transhumans: Technology Powered SuperhumansTranshumans: Technology Powered Superhumans
Transhumans: Technology Powered Superhumans
Institute of Customer Experience
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
Prabh Jeet
 
Clusters & New Economics Of Competition 1
Clusters & New Economics Of Competition 1Clusters & New Economics Of Competition 1
Clusters & New Economics Of Competition 1rishistd
 

Viewers also liked (16)

Social collaboration is the new competition
Social collaboration is the new competitionSocial collaboration is the new competition
Social collaboration is the new competition
 
On competition chapter 7 clusters and competition
On competition chapter 7 clusters and competitionOn competition chapter 7 clusters and competition
On competition chapter 7 clusters and competition
 
Global-Arena.com The New Competition for Growth
Global-Arena.com The New Competition for GrowthGlobal-Arena.com The New Competition for Growth
Global-Arena.com The New Competition for Growth
 
Biometrics Today And Into The Future (2006)
Biometrics Today And Into The Future (2006)Biometrics Today And Into The Future (2006)
Biometrics Today And Into The Future (2006)
 
Stryker (Saurabh Nigam)
Stryker (Saurabh Nigam)Stryker (Saurabh Nigam)
Stryker (Saurabh Nigam)
 
The Future of Biometrics -- Skooks Pong at SXSW
The Future of Biometrics -- Skooks Pong at SXSWThe Future of Biometrics -- Skooks Pong at SXSW
The Future of Biometrics -- Skooks Pong at SXSW
 
New metaphors for competition
New metaphors for competitionNew metaphors for competition
New metaphors for competition
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Sensory Design, Embodied Cognition & The Future of Wearables
Sensory Design, Embodied Cognition & The Future of WearablesSensory Design, Embodied Cognition & The Future of Wearables
Sensory Design, Embodied Cognition & The Future of Wearables
 
The Neuroscience Information Framework:The present and future of neuroscience...
The Neuroscience Information Framework:The present and future of neuroscience...The Neuroscience Information Framework:The present and future of neuroscience...
The Neuroscience Information Framework:The present and future of neuroscience...
 
classless Kulla on Timothy Leary @ c-base
classless Kulla on Timothy Leary @ c-baseclassless Kulla on Timothy Leary @ c-base
classless Kulla on Timothy Leary @ c-base
 
Nanorobotics in neurology
Nanorobotics  in neurologyNanorobotics  in neurology
Nanorobotics in neurology
 
Neuro marketing
Neuro marketing Neuro marketing
Neuro marketing
 
Transhumans: Technology Powered Superhumans
Transhumans: Technology Powered SuperhumansTranshumans: Technology Powered Superhumans
Transhumans: Technology Powered Superhumans
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Clusters & New Economics Of Competition 1
Clusters & New Economics Of Competition 1Clusters & New Economics Of Competition 1
Clusters & New Economics Of Competition 1
 

Similar to Biometrics - Then, Now and the Future

Ai
AiAi
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
Waseelsultan
 
Biometrics
BiometricsBiometrics
Biometricsrourke
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
Jorge Sebastiao
 
Biometrics
BiometricsBiometrics
Biometrics
Shubham Singh
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
ShivaniMeena42
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
Lanate Drummond
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
Bahaa Abdulhadi
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
Adesh Singh
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
BSI British Standards Institution
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Jigisha Aryya
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
Alexander Deucalion
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
Swapnil Jagtap
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
TusharKataria22
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
Vuda Sreenivasarao
 

Similar to Biometrics - Then, Now and the Future (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Ai
AiAi
Ai
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometrics
BiometricsBiometrics
Biometrics
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
Biometrics
BiometricsBiometrics
Biometrics
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics
BiometricsBiometrics
Biometrics
 
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
The Rise of Biometric Locks_ Enhancing Security with Fingerprint and Facial R...
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Multi-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and ApproachMulti-factor Implicit Biometric Authentication: Analysis and Approach
Multi-factor Implicit Biometric Authentication: Analysis and Approach
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 

Biometrics - Then, Now and the Future

  • 1.
  • 2. Introduction • Identifying individuals • Using unique physical attributes • Keeping valuables secure
  • 3. Introduction • The benefits in businesses • Other methods aren’t as reliable • Biometrics is the highest level of security
  • 4. History of Biometrics • Origins back to 200 BC • Alphonse Bertillon, “Bertillonage” • The introduction of fingerprints
  • 5. History of Biometrics • Sir Francis Galtons classification system • The advancement of biometrics • Biometric databases are international
  • 6. Types of Biometrics • Records basic information about user • Sensor captures unique traits about ID • Computer stores data for later use
  • 7. Types of Biometrics Physiological: • Face • Fingerprint • Hand • Iris • DNA Behavioral: • Keystroke • Signature • Voice
  • 8. Biometrics in the Public and Private Sector •High Level Security and Access Control •Traditional means are difficult to control 48% 3% have shared passwords left password written down
  • 9.
  • 10. Biometrics and Consumer Application •Eliminate concerns with identity theft •Nobody is immune 41,496 complaints of Identity Theft
  • 11. Biometrics and Consumer Application •Ensure personal security, including: Home Office Car Financial Transactions Personal effects (laptop, safe, etc.)
  • 12. Biometrics and Consumer Application •iPhone 5S •New technology is currently being developed: •Eye Verify •Accu-Time •Bionym
  • 13. Biometrics and Practical Application •Biometric technology on election day •Only eligible votes cast a ballot
  • 14. Biometrics and Practical Application • NEXUS  Program for pre-approved travelers  Iris recognition kiosks
  • 15. Biometrics and Practical Application • Faster movement through border security • Cost reduction for Canada Border Services • Instructions provided to avoid error
  • 16. Privacy Concerns • Biometric information not stored on systems • Converted into code for later use
  • 17. Disadvantages • Software and hardware failures • User difficulties • High start-up cost
  • 18. Limitations • Physical anomalies cause temporary difficulties • Research will provide adaptive solutions
  • 19. Conclusion • Advantages outweigh disadvantages • Significant return on investment • Continued research required
  • 20. Sources Time Systems. (n.d.). Body As Credential. Retrieved October 28, 2013 from: http://www.accutime.com/Body%20As%20Credential Apple Support. (2013). About Touch ID security. Retrieved on October 23 rd 2013 from http://support.apple.com Applied Biometrics. (n.d.) Implementing Biometrics. Retrieved on October 20th 2013 from http://www.appliedbiometrics.co.uk Biometrics. (n.d.). Dictionary.com Unabridged. Retrieved October 26, 2013, from http://dictionary.reference.com/browse/biometrics Canada Border Services Agency (n.d.). General NEXUS Questions. Retrieved on October 20 th, 2013 from http://www.cbsaasfc.gc.ca/prog/nexus/faq-eng.html Canadian Anti-Fraud Centre Annual Statistics Report (2012). Canadian Anti-Fraud Centre. Retrieved from http://www.antifraudcentre-centreantifraude.ca Garrett, M. (2013, September 9). Payroll Fraud - A Big Threat and How to Avoid It. Forbes. Retrieved from www.forbes.com Griaule Biometrics (2008). Understanding Biometrics. Retrieved from http://www.griaulebiometrics.com/enus/book/understanding-biometrics Iritech Inc. (n.d.) Frequently Asked Questions. Retrieved on October 23rd, 2013 from www.iritech.com. Melton, M. (2013, September 19). Can’t Afford The Biometrically Enhanced iPhone 5? Try EyeVerify!. Retrieved October 28, 2013, from: http://www.activistpost.com/2013/09/cant-afford-biometrically-enhanced.html Moore, G. (2009, March). History of biometrics. Retrieved from http://onin.com/fp/fphistory.html Rubens, P. (2012, August 17). Biometric Authentication: How It Works. eSecurity Planet. Retrieved from www.esecurityplanet.com Ruz, C. (2013, July 17). Preventing fraud in African elections. International Science Grid This Week. Retrieved from http://www.isgtw.org Stinson, L. (2013, September 11). This Little Wristband Will Replace Your Passwords With Your Heartbeat. Retrieved October 28, 2013 from http://www.wired.com/design/2013/09/this-little-wristband-wants-to-replace-your-passwords-and-keys-with-yourheartbeat/ Van Allen, F. (2013, August 8). Google Reveals the 10 Worst Password Ideas. Time Tech. Retrieved from http://techland.time.com Wilson, T. (2005, November 11). How Biometrics Works. How Stuff Works. Retrieved from science.howstuffworks.com/biometrics.htm Zalman, A. (n.d.). History of Biometrics. About.com. Retrieved from http://terrorism.about.com/od/issuestrends/tp/History-ofBiometrics.htm

Editor's Notes

  1. Biometrics is the process of identifying an individual using their unique physical attributes of their body. Using your fingerprints, or your iris, biometric readers can quickly, and easily, verify who you are and what access you should have to secure equipment, locations, and data.
  2. Access control and security are vital parts of businesses around the world, and advances in technology have made biometrics readily available to help organizations manage their security risks. Other methods of identification can be stolen, copied, or otherwise fraudulently obtained. Using biometric authentication provides a more secure way to identify individuals. This report will examine different types of biometric authentication, the advantages and disadvantages of biometric technology, and how biometrics is used in business today.
  3. The origin of biometrics can be traced back to 200 BC. Simple biometrics, like palm and footprint tracings, were used to distinguish different people, usually for crime related incidents. This lead to a 14th century Persian book on using fingerprints to identify people. In the 19th century, Alphonse Bertillon invented anthropometry, a way of using body measurements to identify offenders. This type of biometric was later then called Bertillonage. The largest step in biometrics was taken in the late 19th century when fingerprinting was introduced
  4. Many people, including Bertillon and an Argentinian police official helped established fingerprinting, but the largest contributor was Sir Francis Galton. Galton made a classification system that revolutionized biometrics. He recognized that no two fingerprints were the same and published a book on the classification of fingerprinting. Now we use computers to automate and save fingerprints, and large databases across the world contain information on not only fingerprints but also voices, hands, irises and faces.
  5. All biometric systems will have 3 similar steps and components. When you enroll, the system will record basic information about you, and a sensor will capture an image of the trait that it will use for identification (ex. fingerprint). A computer will then store this information and use software to compare it to the information provided when you try to access the system again.
  6. Biometrics identifiers are classified as either physiological or behavioral. Physiological are related to characteristics of the body, while behavioral relates to patterns of behaviour. Listed are examples of common biometrics used in business today.
  7. NEXUS is program for pre-approved travellers entering Canada or the United States at designated airports. It allows members to easily pass through border services using self-serve iris recognition kiosk. NEXUS cardholders stand in front of the kiosk and look into the adjustable camera so that their irises can be photographed and compared to the images they submitted with their applications.
  8. Nexus users are able to move through border security quickly. Canada Border Services will see a benefit in labour cost reduction by having to employee less border guards and each location. Users must stand perfectly still and look into the camera from the correct height and distance. The system provides audio and visual direction if a user is not in the correct position.
  9. Though biometric technology is becoming commonplace, some users still have questions about privacy. Systems do not store your biometric information; it converted it into a code. Stealing and decoding that data for fraudulent use would be far more difficult than stealing a swipe card, or accessing a password based system.
  10. Like any technology, biometric systems have some disadvantages. Despite research and testing, biometric technology can still fail, and because it is relatively new in the marketplace users can have difficulty adjusted to the system. The start-up cost can also be prohibitive, and lead some companies to remain with the password or pin systems they already have in place.
  11. There are also limitations on biometrics. A fingerprint scanner may not work if a finger is dirty, or cut. Voice recognition can be disturbed by background noise, or voice that is changed because of a temporary cold or throat infection. Continued research will help find the gaps in biometric authentication, and help enhance the systems.
  12. Despite the disadvantages, biometric authentication offers a significant return on investment in terms of security and access control for individuals, organizations, and Governments. The initial start-up cost can be recouped in time and money saved later on. It will be important to continue biometrics research as technology changes, and those who wish to use it fraudulently find ways to overcome the system.
  13. Despite the disadvantages, biometric authentication offers a significant return on investment in terms of security and access control for individuals, organizations, and Governments. The initial start-up cost can be recouped in time and money saved later on. It will be important to continue biometrics research as technology changes, and those who wish to use it fraudulently find ways to overcome the system.