Tuesday, May 5, 2020

Biometrics For Authentication Security And Privacy Implications

Question: Discuss about the Biometrics For Authentication Security And Privacy Implications. Answer: Introduction In the field of information security, it is very important to give the proof that the person, who is accessing the information, is authorized to use it. There are various tools and methods, which can be used for authentication. Biometric authentication is an important tool for information security. This report provides a brief review of literature on the biometrics authentication. The introduction of internet saw technological innovations like biometric device, in finger print reader, as an electronic equivalent to document authentication in online environment. There are some points, when it looks like; use of this technology is still not significant. The major purpose of this report is to review various aspects of biometrics authentication, such as; challenges, problems, relevant technologies and applications of technologies. Furthermore, it includes the technical and legal issues, which are associated with biometrics authentication with various tools used for the analysis. Background One of the major priorities in the world of information security is the assurance that an individual, who is accessing confidential, classified and sensitive information, is authorized to use it. This access is generally completed by the person, who is proving his/her identity by using some resources or tools or nay method of authentication. Biometric authentication is a process, which depends on the exclusive biological characteristics of a particular person to verify his authenticity. This system compares the biometric information capture to already stored and verified and confirmed with authentic data in the database. If the entered data is matched with the stored biometric database, then authentication is confirmed. There are different types of biometric technology like; fingerprint scanner, face and iris recognition. The organizations, which are implementing biometrics, are facing some privacy and security issues in protecting the sensitive information. Scope of engagement The scope of this research is limited to the challenges and technologies, associated with the biometric authentication. It does not include other benefits of this technology. It only includes a single issue of information security in details, other issues are not discussed. The scope is to develop the understanding about the biometric authentication and its security and privacy implications. This includes the types and technologies of the biometric authentication. Through this research project, research of biometric system and its types will be explored. Tools used To make the findings about the selected topic, i.e. biometrics for authentication, a great research is conducted and results are reviewed in the given literature. The information is taken from the tech organizations, who are designing software and security applications for securing the confidential and sensitive information and materials (Vacca, 2007). The information was gathered by completing the research on topic in the group. Analysis and Findings From this research, it is found that biometric authentication offers more security and convenience in comparison to other traditional methods of personal identification. This research analysed that a biometric system is a pattern identification system, which recognizes a person on the basis of a feature that is derived from specific behavioural and biological characteristics, such as fingerprint, face, iris, signature, hand geometry, voice etc. (Bergsman, 2016). In todays business environment, this method is preferred over other traditional methods, like; pins and passwords. The identification, which is done by the biometric techniques, eliminates the need of remembering a password or pin. By replacing the passwords and pins, biometric systems can prevent the unauthorized access to or false utilization of system (Bowyer, Hollingsworth Flynn, 2008). The research analyses that this technology plays an important role in the security to offer the extremely secured verification and ident ification solutions. There are three major factors, which can be used for the use authentication, i.e. fingerprint scanner, face or voice recognition and iris recognition. Fingerprint biometric is one of the oldest forms of biometric and this is most reliable, when it comes to the authentication. The fingerprint scanners are very easy to use that makes them more favourable among the users. But this type of biometrics has some weaknesses, because fingerprints can be copied from the authorized users coffee mug or calculator for the harmful access. They can be bothersome if the fingerprint of a person is altered and damaged (Rattani, Roli Grange, 2015). The second one is face recognition system, which is similar to the fingerprint scanners. This type of technique is favourable because of its ease of use. But, this system can also be used for malicious access copying the face of user from the photographs. Retinal and iris scanners are considered more secure form of the biometric authentication, because it i s very difficult task to copy a retinal pattern of a person. There are some problems and challenges in the implementation of biometric system. This process can be very complicated and expensive because it requires spending on software and hardware. The process of placing this system differs for different technique; so first, organizations must consider which type of biometric system to install and then they should plan the process accurately (Rani Malik, 2015). There are some risks, which are intensified by the technological exposures of the biometric systems. From the research, it is identified that there is not biometric system, which provides 100% success in verifying and identifying the people, who are registered to the system. This system results high costs for the organization and client interruption. Thus, a high integrity biometric authentication system can be a best solution for the organization, but in turn it carriers high risks related to autonomy and privacy (Woollacott, 2015). Security and privacy implications The research found that biometric data includes the information, which is obtained from the individuals that can be used to recognize them. It raises the issues of data protection and privacy. If the data in biometric is recorded in the central database, the privacy issues may be comparatively higher than system, where the data of a person is stored only on a card, which is taken by the individual (Davenport, 2008). Most of the organizations and people consider biometric system as one of the most innovative types of authentication, but this system has some errors. For example, people think that it is not possible to copy biometric information of a user, but when the data is transformed into electronic data, it can be hacked by the hackers and stolen from the systems because it transferred via insecure networks. Generally, organizations place the biometric system with the intention of decreasing the possibility of hackers getting access to the information in biometric. Copying this data is very difficult, but still there is a risk. It is necessary that companies take many precautions to make sure that the data is transferred, collected and stored correctly. Another concern with the biometric authentication is the lack of revocability; it means biometric cannot be pitched and replaced like password, pins and credit card number (Mir, Rubab, Jhat, 2011). It is permanently connected with the authentic user. Two other issues, which are discussed by the peers, are security threats in smart devices and security and privacy issues in Internet of Things. However both the issues are different from my issue, i.e. biometric authentication and related security and privacy implications. This issue provides the knowledge regarding the security and privacy issues, as biometric system is also a smart device, which is used for protecting the information. The summary provided by them accurate but that is not sufficient to understand the topic (Peltier, 2013). There is need of future research. Employee privacy is an important issue, which is not discussed in the forum. In the todays working environment, it is very important to ensure the privacy of employees for protecting the customer and confidential business information (Peltier, 2016). Employer can do this by controlling and monitoring the electronic messaging devices of employees. Impact in real life Biometric authentication and other information technology issues have huge impact on the real life of an individual and organizations. Understanding these issues can help in gaining knowledge about the threats and privacy and security issues related to modern and advanced technology on the children, youth, adults, whole society and organizations (Bhagavatula, Ur, Iacovino, Kywe, Cranor Savvides, 2015). Biometric authentication can assist in real life to secure the confidential information. These issues have both positive and negative impact on real life. From the peers discussion, it was found that it improves the quality of lives of people, develop new opportunities and markets and increase the economic and financial growth. People should understand the privacy issues related to Internet of Things (Madakam, Ramaswamy Tripathi, 2015). This is related to the wireless sensors, so it includes the issues of confidentiality, accessibility, availability and accuracy. This research can he lp the people in knowing about various information security systems and related security and privacy concerns. Conclusion Thus, the report concludes there are various Information Technology issues, which have both negative and positive impact on the life of people and organizations. The above-mentioned topics can be used for the securing the information and data. Biometric authentication is a most popular system to for securing the confidential information by using biological characteristics, like; finger print, retinal, face etc. Since this is very difficult for a hacker to get access to the biometric data and it is improbably that a user will misuse his/ her stored data. Furthermore, there are some other important issues like threats from smart devices and Internet of Things. These issues also have a large impact on the real life References Bergsman, J. (2016). Biometrics are less secure than passwords-This is why. Retrieved from https://betanews.com/2016/08/24/unsafe-biometrics/. Bhagavatula, C., Ur, B., Iacovino, K., Kywe, S. M., Cranor, L. F., Savvides, M. (2015). Biometric authentication on iphone and android: Usability, perceptions, and influences on adoption.Proc. USEC, 1-2. Bowyer, Hollingsworth K. Flynn P.J. (2008). Image Understanding for Iris Biometrics: a Survey. Computer Vision and Image Understanding, Vol. 110. Davenport, T. H. (2013).Process innovation: reengineering work through information technology. Harvard Business Press. Grant, D.D. (2008). Developing employment policies for e-mail, cell phones, instant messaging, and text messaging. Stafford Frey Cooper. Madakam, S., Ramaswamy, R. Tripathi, S. (2015). Internet of Things (IoT): A Literature Review. Journal of Computer and Communications, vol. 3, pp. 164-173. Mir A.H, Rubab, S Jhat, Z. A, (2011). Biometrics Verification: a Literature Survey. Journal of Computing and ICT Research, Vol. 5, Issue 2, pp 67-80. Peltier, T. R. (2013).Information security fundamentals. CRC Press. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Rani, M. Malik, R. (2015). Review on Scope and Enhancements in 3d Biometrics. International Journal of Technical Research (IJTR) Vol. 4, Issue 3. Rattani, A., Roli, F. Grange, E. (2015). Adaptive Biometric Systems: Recent Advances and Challenges. Springer Publications. Vacca, J.R. (2007). Biometric Technologies and Verification Systems. Butterworth-Heinemann Publications.Woollacott, E. (2015). Reviewing biometric privacyconcerns. Retrieved from https://www.raconteur.net/technology/security-concerns-with-biometrics

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.