Biometrics in IT Security

Introduction

Biometrics refers to the use of uniquely identifiable human characteristics to secure systems. Biometric information like height, hair color, weight, and eye color has been used for a long to assist in the physical identification of individuals. However, the constant change of biometrics and the ease with which they can be manipulated has led security personnel to use biometric data that remains the same with changing age and health. This biometrics is not as easy to fake as the earlier biometrics. The essay examines this form of biometrics.

Examples of biometrics

There are many biometric schemes used for beefing up computer security. The security accorded by each of them depends on its suitability for use in the system to be secured. Examples include fingerprint identification, face recognition, hand geometry biometrics, retina scan, iris scan, voice analysis, vein analysis, signature etcetera. Each of the above biometrics can be faked in one way or another and each of them is most appropriate in specific conditions. Although biometrics has some problems, it has played a very important role in the field of computer security and it is important to acknowledge its contribution.

Benefits of biometric security

Biometric technology is no longer fictitious. Although major advancements are still expected in this technology, biometrics has evolved to become one of the most important security innovations of all time. The need for use of biometric technology has been compounded by the fact that common security methods like the use of Passwords are characterized by a lot of problems.

Kemibaro, Harry. Biometrics security overview

For instance, some passwords are easy to hack, people may forget them, and people may keep passwords in notebooks. Some of the advantages of biometric technology include: biometric security through identification of people is very critical in the provisioned of access to information. Authentic users of information are securely and accurately identified by the biometrics before they are granted access to the information. This is usually achieved through the use of fingerprint identification, retinal scans, and iris scans that are capable of unique identification if done properly. Most biometric technology is automated and thus the scans are quick and standardized. The scans can also be carried out by minimally-trained personnel. Lastly, biometrics gives a means of identifications without the use of physical documents that can easily change hands, be lost, be damaged, or altered.

Vulnerabilities of biometric security

The fact that biometrics use parts of the body that have other functions have more than compensated for the weakness associated with biometrics. People use their hands and fingers in performing various activities. This way, people leave their fingerprints in virtually everything that they touch. With proper recording, these fingerprints can be transferred to fingerprint detection systems and authenticate unauthorized access to information. With an understanding of the common patterns of fingerprints, fake fingerprints can also be created. To evidence this, a Japanese expert has been able to create fake fingerprints that were approved as authentic by a biometric thumb scanner. It is also amazing that a thumb scanner using capacitive resistance can be fooled by just blowing over the reader after an authentic user has used it.

Dunn, Jones. Biometric Authentication Technology: From the Movies to Your Desktop

Schneider, Leakey. Biometric Authentication: What method works best?

This is explained by the fact that after authorized login, latent oil from the thumb is left on the capacitive surface with the fingerprint signature. Blowing the surface thus makes the reader sense the fingerprint pattern left and thus the reader authenticates login/access. Each existent biometric has specific weaknesses that make it vulnerable to exploitation by malicious people. In Germany, a facial recognition scanner was fooled into making positive scans by a short video shown to its camera. In the same way, a voice recognition system can be easily fooled by a voice recording. Biometrics can also deny an authorized person from accessing the system they secure. This is especially evident after repeated attempts of unauthorized access (4). It can be literally argued that the biometric becomes accustomed to denial of access such that an authorized attempt at login/access is considered unauthorized. Therefore, as long as biometrics remains prone to manipulation they will never be able to solely secure systems.

Conclusion

Although biometrics have a considerably large number of shortcomings, they are very essential in the provision of security. The contribution of biometrics to the building of impenetrable security systems especially in the military is massive. It is therefore of great essence that we major on the strengths of biometrics and deal with its weaknesses. One of the mistakes that we make in building our security systems is the overreliance on biometrics.

  • McFarlane, Ben. Biometric security is merely skin-deep
  • Maltoni, Davide. Biometric Authentication Workshop

Although passwords have proved to be practically insecure, it is not wise to replace passwords with biometrics. Biometrics should thus be used as an enhancement for passwords. Consider an ATM (Automated Teller Machine) security system that requires a PIN as well as a fingerprint. Even if somebody gains access to your fingerprint, it will be very hard for them to get your PIN in order for them to get the complete access code. Therefore this kind of security is better than that of the PIN alone or a case in which the PIN is replaced with the fingerprint scan.

References

Dunn, Jones. Biometric Authentication Technology: From the Movies to Your Desktop. Web.

Kemibaro, Harry. Biometrics security overview. 2008. Web.

Maltoni, Davide. Biometric Authentication Workshop. 2004. Web.

McFarlane, Ben. Biometric Security Barely Skin-Deep. 2009. Web.

Schneider, Leakey. Biometric authentication: what method works best? 2009. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2022, February 19). Biometrics in IT Security. https://studycorgi.com/biometrics-in-it-security/

Work Cited

"Biometrics in IT Security." StudyCorgi, 19 Feb. 2022, studycorgi.com/biometrics-in-it-security/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Biometrics in IT Security'. 19 February.

1. StudyCorgi. "Biometrics in IT Security." February 19, 2022. https://studycorgi.com/biometrics-in-it-security/.


Bibliography


StudyCorgi. "Biometrics in IT Security." February 19, 2022. https://studycorgi.com/biometrics-in-it-security/.

References

StudyCorgi. 2022. "Biometrics in IT Security." February 19, 2022. https://studycorgi.com/biometrics-in-it-security/.

This paper, “Biometrics in IT Security”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.