ecurityand cyber siometricB
‫المتدرب‬/‫مده‬ ‫إيهاب‬-438138062
‫م‬ /‫المقرر‬ ‫مدرب‬‫العدي‬ ‫.ابراهيم‬‫ني‬
Introduction
Computers play an important role in our daily lives and their
use has grown today. With continuous increase
Request security regulations around the world and a large
number of services are provided using the Internet in the day
To daily life, ensuring security associated with such services
has become a critical issue. Biometrics are the key
Future data / cybersecurity. This research provides a
biometric data recognition system that can be included
In any system involves access control, e-commerce, online
banking, login to the computer etc. to enhance security.
Fingerprint is an old and mature technique used in this work
as a biological advantage. In this research
Fingerprint recognition system, facial recognition system and
eye recognition system
Biomarkers are a process used to identify or document an
individual using any physical or behavioral characteristics.
These characteristics can include - but are not limited to -
fingerprints, hand shape, retina scan, iris, face mapping,
signature or writing method, and recently DNA maps.
While relatively new, biometrics is rapidly advancing and
growing in acceptance and use. Biometrics is used by
governments for passports, airports and site securities.
Fingerprints and DNA are used by policing agencies for
forensic and identification purposes. Disney World uses
fingerprint scanners at the entrance of is theme parks for
season pass holders and resort guests. Casinos use face
recognition technology to detect known scam artists.
But with any new technology comes peril amid its promise,
and biometrics is no exception. The same biometric methods
that an organization employs for greater security can be
turned against them by intruders. If risk managers are to
realize the full potential of biometrics, they must learn its
vulnerabilities and how to use this tool with risk management
in mind.
For risk managers, the importance of this emerging
technology does not necessarily lie in learning the intricacies
of how biometric science works, but in exploring the
management of the exposures biometrics present to
individuals, businesses and governments. This process begins
with identifying the cyber-risk exposures that biometrics
makes possible.
System vulnerability. Weak points in cyber-systems are
identified in various internal network entry points and
integral components such as workstations, employee
awareness, servers, databases, mainframes, mobile users and
remote users. In addition, external network influences that
pose weak points include vendors, customers and partners.
System circumvention. This involves using systems in ways
they were not intended. For example, hackers can gain access
to a system using hardware and software weaknesses. Once a
system's weakness has been found, it gives intruders the
ability to use, sell, alter or destroy the data stored on it. The
weakness could be from inadequate network security, or
leaked or stolen passwords. Hackers may include terrorists,
stalkers, abusive ex-spouses, blackmailers or organized crime.
There is no single profile that encompasses all hackers, either
by the methods they use or by their motives for invading data
systems.
Verification fraud. Circumvention of the system during the
process of verification itself can be achieved in a number of
ways. A perpetrator may be able to force an individual with
registered biometrics to provide his biometric sample (i.e.,
fingerprint, iris scan, etc.) enabling entry to the network. Or
on a more grisly note, an amputated finger or hand could be
applied to a scanner.
Facsimiles of the actual biometric could allow unauthorired
access into a system. For example, the employment of a
digitally copied iris printed on a contact lens and applied to
the eye of a perpetrator could fool an iris scanning system
into allowing entry.
A "hill climbing attack" employs a pattern recognition method
that allows for guessing the reference data
For example
There is a system of identification of the retina is now used in
several places in the government departments, airports, banks,
passports and hospitals, and works in the following way
Iris Recognition It is a biometric identification method that
works with mathematical pattern-recognition techniques on
video images. The complex metrics of this identification
system are unique, fast and stable compare to other
modalities.
Why use biometrics?
There are more people on Earth than ever before, owning
more things, and swapping more information every single
day. Security has never been more important but—ironically,
thanks to the computing power at everyone's disposal—never
easier to crack. Traditionally, security relies on things that are
difficult to do quickly: locks are physically difficult to bust
open without the correct metal keys, while information
secured by encryption (computerized scrambling) is hard to
access without the right mathematical keys. But this kind of
security has a basic flaw: with the right key, even the wrong
person can quickly gain access.
Most security experts think biometrics (body measurement) is
the answer. Instead of restricting access to things through
arbitrary locks and keys, we grant access to people if we can
positively identify them by measuring some unique pattern on
their body. If you think about it, an ordinary passport photo is
a crude example of biometrics. When the border guards look
at your face and compare it with your passport photo, what
they're doing is intuitively comparing two images. Is one nose
bigger than another? Are the eyes further apart? That's simple
biometrics. The trouble is that our faces change all the time
and lots of people look very similar. Fingerprints are a more
reliable form of biometrics, but even they're not infallible:
illnesses and injuries, as well as basic wear-and-tear, can alter
the pattern of ridges on our fingers in time. Iris scans are a
much more reliable way of identifying people—simplying by
taking quick photographs of their eyes
Start using biometrics and where to get
Since 1800 fingerprint information has been collected from
human fingers and hands through ink and paper. For the
purposes of this document, the term "footprint" is used to
mean the details of the skin surface friction layer of a part of
the hand, such as a single fingerprint or the entire hand.
Fingerprints are an example of biometrics that can be used to
identify individuals. Other biometrics that are used to identify
individuals are hand, sound, iris, retina and facial
characteristics.
In recent years, many electronic fingerprint scanning systems
have been developed using optical methods, capacitance,
direct pressure, thermal methods and ultrasound. Ultrasound-
based methods have proved to be extremely accurate, as they
are isolated from the effects of grease, dirt, paint, ink and
other image contaminants. Fingerprint scanning systems now
appear in places where ink and paper selection methods are
not desirable. Because fingerprint scanners are easy to use
and do not leave a messy mark on the person being identified,
fingerprint scanners are used to identify individuals in many
situations. For example, it is now common to find biological
scanners used in security systems to identify authorized
personnel. Some of these security systems determine
whether an individual is authorized to enter a building by
scanning the individual's fingerprint for a biometric sample,
and then comparing the biometric sample with the fingerprint
samples stored in a database that are known to come from
authorized individuals. When a matching sample is found in
the database, an individual may be allowed into the building.
In order to allow greater use of biometric scanners, biopsies
should often be installed in new or existing facilities. There is
a need to prevent the removal of the biometric scanner from
the installation. Thus, a biometric security system is needed
that can be installed on new or existing facilities
Conclusion
This research introduces fingerprint recognition, facial
recognition and eye recognition
Which can be used for computer login, access control,
Internet
Banking or other applications where security is a concern.
Biometrics are used effectively as a safeguard against
Cyber Crime. In this work fingerprint recognition system and
others
Developed and linked to electronic services to increase the
degree of protection and safety
Especially the difficulty of forging these fingerprints
References
https://www.cnahardy.com/news-and-
insight/insights/english/cyber-securit-the-future-risk-of-
biometric-data-theft
https://www.cl.cam.ac.uk/~jgd1000/iris_recognition.html
http://www.toyonway.com/en/col.jsp?id=347&gclid=EAIaIQo
bChMI_KGQ3vCy4wIVhTXTCh2KRwuJEAAYASAAEgIbXPD_BwE
https://www.androidauthority.com/how-fingerprint-
scanners-work-670934/
https://link.springer.com/book/10.1007%2F978-3-319-47301-
7

More Related Content

PDF
Case study on Usage of Biometrics (Cryptography)
PDF
Biometric System and Recognition Authentication and Security Issues
PDF
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
PDF
Biometrics/fingerprint sensors
PDF
Biometrics Research/Thesis Paper
PPT
Biomatrics
DOCX
Jss academy of technical education
PPTX
Bi ometric security
Case study on Usage of Biometrics (Cryptography)
Biometric System and Recognition Authentication and Security Issues
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
Biometrics/fingerprint sensors
Biometrics Research/Thesis Paper
Biomatrics
Jss academy of technical education
Bi ometric security

What's hot (20)

PPTX
Biometric of technology.ppt
PDF
Iris recognition and the challenge of homeland & border control security in UAE
PDF
hand vein structure authentication
DOC
Personal authentication using 3 d finger geometry (synopsis)
PPTX
Biometrics
PDF
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
PPTX
Biometrics
PDF
Biometrics Starts
PDF
Introduction of Biometrics
PPTX
Biomatric technology
PPTX
Biomatrics
PPTX
Seminar
PDF
Comparison of various Biometric methods
PPTX
Design and development of dorsal hand vein recognition biometric system usin...
DOCX
sistemponto
PDF
IRJET- Eye Tracking for Password Authentication using Machine Learning
PDF
Biometric Recognition for Authentication, BSides Austin, May 2017
PPTX
Biometrics present
TXT
kiran's slide info
PPT
BIOMETRICS FINGER PRINT TECHNOLOGY
Biometric of technology.ppt
Iris recognition and the challenge of homeland & border control security in UAE
hand vein structure authentication
Personal authentication using 3 d finger geometry (synopsis)
Biometrics
What Is Facial Recognition, How It Is Used & What Is It’s Future Scope?
Biometrics
Biometrics Starts
Introduction of Biometrics
Biomatric technology
Biomatrics
Seminar
Comparison of various Biometric methods
Design and development of dorsal hand vein recognition biometric system usin...
sistemponto
IRJET- Eye Tracking for Password Authentication using Machine Learning
Biometric Recognition for Authentication, BSides Austin, May 2017
Biometrics present
kiran's slide info
BIOMETRICS FINGER PRINT TECHNOLOGY
Ad

Similar to Biometric and cyber security 1 (20)

PDF
Biometrics system penetration in mobile devices
PDF
Biometrics & Finger print Technology
PPTX
Bio-Metrics through finger print
PPTX
2019001791_Fingerprint_Authentication.pptx
PPT
PPTX
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
PPT
Bio Metrics
PPTX
Biometric security using cryptography
PPTX
INTRODUCTION TO BIOMETRIC.pptx
DOCX
Biometrics
PPTX
Fingerprinting technology
PPTX
Biometric security tech
PPTX
PPTX
BIOMETRIC (TO PRERVE OUR IDENTY)
PDF
Biometrics Technology
PDF
IRJET - A Review of Cyber Security using Biometric Devices
PDF
MAIN_BIOMETRIC.pdf
DOCX
Cybersecurity governance-1.docx
PPTX
21392009 laddi
PPTX
Biometric security system
Biometrics system penetration in mobile devices
Biometrics & Finger print Technology
Bio-Metrics through finger print
2019001791_Fingerprint_Authentication.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
Bio Metrics
Biometric security using cryptography
INTRODUCTION TO BIOMETRIC.pptx
Biometrics
Fingerprinting technology
Biometric security tech
BIOMETRIC (TO PRERVE OUR IDENTY)
Biometrics Technology
IRJET - A Review of Cyber Security using Biometric Devices
MAIN_BIOMETRIC.pdf
Cybersecurity governance-1.docx
21392009 laddi
Biometric security system
Ad

Recently uploaded (20)

PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PDF
Journal of Dental Science - UDMY (2022).pdf
PDF
Nurlina - Urban Planner Portfolio (english ver)
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
PUBH1000 - Module 6: Global Health Tute Slides
PDF
Journal of Dental Science - UDMY (2021).pdf
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
DOCX
Ibrahim Suliman Mukhtar CV5AUG2025.docx
PDF
Hospital Case Study .architecture design
PDF
Compact First Student's Book Cambridge Official
PPTX
What’s under the hood: Parsing standardized learning content for AI
PDF
semiconductor packaging in vlsi design fab
PDF
African Communication Research: A review
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
faiz-khans about Radiotherapy Physics-02.pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
The TKT Course. Modules 1, 2, 3.for self study
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
Journal of Dental Science - UDMY (2022).pdf
Nurlina - Urban Planner Portfolio (english ver)
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
Civil Department's presentation Your score increases as you pick a category
PUBH1000 - Module 6: Global Health Tute Slides
Journal of Dental Science - UDMY (2021).pdf
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Ibrahim Suliman Mukhtar CV5AUG2025.docx
Hospital Case Study .architecture design
Compact First Student's Book Cambridge Official
What’s under the hood: Parsing standardized learning content for AI
semiconductor packaging in vlsi design fab
African Communication Research: A review
Cambridge-Practice-Tests-for-IELTS-12.docx
faiz-khans about Radiotherapy Physics-02.pdf

Biometric and cyber security 1

  • 1. ecurityand cyber siometricB ‫المتدرب‬/‫مده‬ ‫إيهاب‬-438138062 ‫م‬ /‫المقرر‬ ‫مدرب‬‫العدي‬ ‫.ابراهيم‬‫ني‬
  • 2. Introduction Computers play an important role in our daily lives and their use has grown today. With continuous increase Request security regulations around the world and a large number of services are provided using the Internet in the day To daily life, ensuring security associated with such services has become a critical issue. Biometrics are the key Future data / cybersecurity. This research provides a biometric data recognition system that can be included In any system involves access control, e-commerce, online banking, login to the computer etc. to enhance security. Fingerprint is an old and mature technique used in this work as a biological advantage. In this research Fingerprint recognition system, facial recognition system and eye recognition system
  • 3. Biomarkers are a process used to identify or document an individual using any physical or behavioral characteristics. These characteristics can include - but are not limited to - fingerprints, hand shape, retina scan, iris, face mapping, signature or writing method, and recently DNA maps. While relatively new, biometrics is rapidly advancing and growing in acceptance and use. Biometrics is used by governments for passports, airports and site securities. Fingerprints and DNA are used by policing agencies for forensic and identification purposes. Disney World uses fingerprint scanners at the entrance of is theme parks for season pass holders and resort guests. Casinos use face recognition technology to detect known scam artists. But with any new technology comes peril amid its promise, and biometrics is no exception. The same biometric methods that an organization employs for greater security can be turned against them by intruders. If risk managers are to realize the full potential of biometrics, they must learn its vulnerabilities and how to use this tool with risk management in mind. For risk managers, the importance of this emerging technology does not necessarily lie in learning the intricacies of how biometric science works, but in exploring the management of the exposures biometrics present to individuals, businesses and governments. This process begins with identifying the cyber-risk exposures that biometrics makes possible. System vulnerability. Weak points in cyber-systems are identified in various internal network entry points and integral components such as workstations, employee awareness, servers, databases, mainframes, mobile users and
  • 4. remote users. In addition, external network influences that pose weak points include vendors, customers and partners. System circumvention. This involves using systems in ways they were not intended. For example, hackers can gain access to a system using hardware and software weaknesses. Once a system's weakness has been found, it gives intruders the ability to use, sell, alter or destroy the data stored on it. The weakness could be from inadequate network security, or leaked or stolen passwords. Hackers may include terrorists, stalkers, abusive ex-spouses, blackmailers or organized crime. There is no single profile that encompasses all hackers, either by the methods they use or by their motives for invading data systems. Verification fraud. Circumvention of the system during the process of verification itself can be achieved in a number of ways. A perpetrator may be able to force an individual with registered biometrics to provide his biometric sample (i.e., fingerprint, iris scan, etc.) enabling entry to the network. Or on a more grisly note, an amputated finger or hand could be applied to a scanner. Facsimiles of the actual biometric could allow unauthorired access into a system. For example, the employment of a digitally copied iris printed on a contact lens and applied to the eye of a perpetrator could fool an iris scanning system into allowing entry. A "hill climbing attack" employs a pattern recognition method that allows for guessing the reference data
  • 5. For example There is a system of identification of the retina is now used in several places in the government departments, airports, banks, passports and hospitals, and works in the following way Iris Recognition It is a biometric identification method that works with mathematical pattern-recognition techniques on video images. The complex metrics of this identification system are unique, fast and stable compare to other modalities.
  • 6. Why use biometrics? There are more people on Earth than ever before, owning more things, and swapping more information every single day. Security has never been more important but—ironically, thanks to the computing power at everyone's disposal—never easier to crack. Traditionally, security relies on things that are difficult to do quickly: locks are physically difficult to bust open without the correct metal keys, while information secured by encryption (computerized scrambling) is hard to access without the right mathematical keys. But this kind of security has a basic flaw: with the right key, even the wrong person can quickly gain access. Most security experts think biometrics (body measurement) is the answer. Instead of restricting access to things through arbitrary locks and keys, we grant access to people if we can positively identify them by measuring some unique pattern on their body. If you think about it, an ordinary passport photo is a crude example of biometrics. When the border guards look at your face and compare it with your passport photo, what they're doing is intuitively comparing two images. Is one nose bigger than another? Are the eyes further apart? That's simple biometrics. The trouble is that our faces change all the time and lots of people look very similar. Fingerprints are a more reliable form of biometrics, but even they're not infallible: illnesses and injuries, as well as basic wear-and-tear, can alter the pattern of ridges on our fingers in time. Iris scans are a much more reliable way of identifying people—simplying by taking quick photographs of their eyes
  • 7. Start using biometrics and where to get Since 1800 fingerprint information has been collected from human fingers and hands through ink and paper. For the purposes of this document, the term "footprint" is used to mean the details of the skin surface friction layer of a part of the hand, such as a single fingerprint or the entire hand. Fingerprints are an example of biometrics that can be used to identify individuals. Other biometrics that are used to identify individuals are hand, sound, iris, retina and facial characteristics. In recent years, many electronic fingerprint scanning systems have been developed using optical methods, capacitance, direct pressure, thermal methods and ultrasound. Ultrasound- based methods have proved to be extremely accurate, as they are isolated from the effects of grease, dirt, paint, ink and other image contaminants. Fingerprint scanning systems now appear in places where ink and paper selection methods are not desirable. Because fingerprint scanners are easy to use and do not leave a messy mark on the person being identified, fingerprint scanners are used to identify individuals in many situations. For example, it is now common to find biological scanners used in security systems to identify authorized personnel. Some of these security systems determine whether an individual is authorized to enter a building by scanning the individual's fingerprint for a biometric sample, and then comparing the biometric sample with the fingerprint samples stored in a database that are known to come from authorized individuals. When a matching sample is found in the database, an individual may be allowed into the building.
  • 8. In order to allow greater use of biometric scanners, biopsies should often be installed in new or existing facilities. There is a need to prevent the removal of the biometric scanner from the installation. Thus, a biometric security system is needed that can be installed on new or existing facilities
  • 9. Conclusion This research introduces fingerprint recognition, facial recognition and eye recognition Which can be used for computer login, access control, Internet Banking or other applications where security is a concern. Biometrics are used effectively as a safeguard against Cyber Crime. In this work fingerprint recognition system and others Developed and linked to electronic services to increase the degree of protection and safety Especially the difficulty of forging these fingerprints