2
Most read
3
Most read
4
Most read
Biometrics in Security
Shruti Marota
What are biometrics?
● Biometrics are measurable, unique physical
characteristics that are used to identify individuals.
● There are 3 types of biometrics:
○ Biological biometrics: uses traits at a
genetic/molecular level to identify individuals
(DNA/Blood).
○ Morphological biometrics: uses physical traits or
the structure of the body to identify individuals
(eyes, fingerprints, or shape of the face).
○ Behavioral biometrics: uses unique behavioral
patterns for identification (how the individual
walks/talks).
● Common biometrics:
○ Fingerprint scanning
○ Facial recognition
○ Iris recognition
○ Heart-rate sensors
○ Voice recognition
○ Hand geometry recognition
https://fcw.com/-
/media/GIG/EDIT_SHARED/Cyber/Biometrics/biometrics_shutterstoc
How are biometrics used in security?
● Biometric data can be used in technology in place of certain security systems.
It can also be used to enhance pre-existing security systems on phones,
computers, or even buildings.
● However, in order to be useful, this data must be permanent and able to be
collected.
○ This data is encrypted and stored either within the device or on remote
servers.
● Biometric systems consist of 3 parts:
○ The sensor: records and reads biometric information for verification of
identity
○ The computer: stores information for comparison against stored data
○ The software: links the computer hardware to the sensor to allow for data
to be collected
Advantages of Biometrics
● Convenience
○ Biometrics make it easier for users to access their devices or personal
information. Unlike long and complicated passwords, biometric data such
as your fingerprint cannot be lost or changed.
● Privacy
○ Since biometrics cannot be changed, the use of biometric systems ensures
that the only people that can access devices or data are the ones that have
been given access or permission to do so.
Disadvantages of Biometrics
● Accuracy is not Guaranteed
○ Facial recognition can be tricked. Researchers at the University of North
Carolina at Chapel Hill conducted an experiment to test five security
systems that use facial recognition software. They downloaded photos of
20 volunteers from social media and constructed 3D models of their faces.
The researchers were able to breach four out of the five systems.
○ It is also extremely easy to clone fingerprints using just plastic or candle
wax, which can be used to unlock devices.
● Software Flaws
○ Hackers could exploit any flaws in biometric system software, leaving user
data vulnerable.
○ Passwords can be changed if accounts become unprotected, but biometric
data cannot be modified.
Disadvantages of Biometrics
● Lack of Federal Laws
○ Currently, there aren’t any cohesive laws in the United States to protect
user’s biometric data. Hopefully, as biometrics becomes more common,
legislation will be put in place to keep this sensitive data safe.
.
How can you protect your data?
● It is paramount that you take the proper precautions to keep your data secure.
○ Use biometrics sparingly to keep your biometric data stored in a few
places, and opt out of biometric data collection if you want.
○ Keep the software on your devices current as it reduces the probability of
your device being vulnerable to security flaws.
○ Use two-factor authentication on accounts to add an extra layer of
protection onto your accounts (visit our Two-Factor Authentication page
for more information).
Sources
● https://www.kaspersky.com/resource-center/definitions/biometrics
● https://us.norton.com/internetsecurity-iot-biometrics-how-do-they-work-are-they-
safe.html
● https://www.ifsecglobal.com/global/biometric-security-systems-guide-devices-
fingerprint-scanners-facial-recognition/
● https://blogs.thomsonreuters.com/answerson/biometrics-technology-convenience-data-
privacy/
● https://www.nedapsecurity.com/insight/biometric-security/

More Related Content

PPTX
Biometrics technology
PPTX
Biometrics
PPT
3D Password
PPTX
Biometrics Technology, Types & Applications
PPTX
Biometric
PPTX
Biometrics
PPTX
Biometric authentication ppt by navin 6 feb
PPTX
Biometrics Based Authentication AKASH
Biometrics technology
Biometrics
3D Password
Biometrics Technology, Types & Applications
Biometric
Biometrics
Biometric authentication ppt by navin 6 feb
Biometrics Based Authentication AKASH

What's hot (20)

PPTX
Biometric authentication
PPTX
Biometrics
PPTX
Biometric Systems and Security
PPTX
Biometrics
PPT
A study on biometric authentication techniques
PPTX
Biometrics security
PPTX
Biometrics Security System
PPT
How fingerprint technology work
PPTX
Biometric technology
PPTX
Introduction To Biometrics
PPTX
MULTIMODAL BIOMETRIC SECURITY SYSTEM
PPT
Biometric security Presentation
PPT
Fingerprint Technology
PPTX
poster on biometrics
DOC
Biometrics Technology Seminar Report.
PPTX
Biometrics Technology In the 21st Century
PPT
Bio-metrics Authentication Technique
PPTX
Biometrics technology
PPT
Biometrics
PPT
Biometric encryption
Biometric authentication
Biometrics
Biometric Systems and Security
Biometrics
A study on biometric authentication techniques
Biometrics security
Biometrics Security System
How fingerprint technology work
Biometric technology
Introduction To Biometrics
MULTIMODAL BIOMETRIC SECURITY SYSTEM
Biometric security Presentation
Fingerprint Technology
poster on biometrics
Biometrics Technology Seminar Report.
Biometrics Technology In the 21st Century
Bio-metrics Authentication Technique
Biometrics technology
Biometrics
Biometric encryption
Ad

Similar to Biometrics in Security (20)

PPT
Biometric
PDF
Privacy & Ethics in Biometric Patterns
PPTX
Biometrics
PPTX
Biometric Identification system.pptx
PPTX
Biometrics
DOC
Poster on biometrics
PPTX
Biometrics and its applications in Medical
PPTX
Biometrics and its applications for system Analysis
PPTX
Biometrics and its applications for system Analysis
PPTX
Biometrics and its applications in Medical
PPTX
Facial Recognition Technology
PPTX
Bio-metric Safety engineering in mobile devices
PDF
Security Issues Related to Biometrics
PPTX
Biometric Systems
PPTX
Biometrics(By Aashish Tanania)
PPT
Biometrics
PDF
HKGCC_Luncheon_20160413
PPT
Biometric Security advantages and disadvantages
PDF
Biometrics Essay
Biometric
Privacy & Ethics in Biometric Patterns
Biometrics
Biometric Identification system.pptx
Biometrics
Poster on biometrics
Biometrics and its applications in Medical
Biometrics and its applications for system Analysis
Biometrics and its applications for system Analysis
Biometrics and its applications in Medical
Facial Recognition Technology
Bio-metric Safety engineering in mobile devices
Security Issues Related to Biometrics
Biometric Systems
Biometrics(By Aashish Tanania)
Biometrics
HKGCC_Luncheon_20160413
Biometric Security advantages and disadvantages
Biometrics Essay
Ad

More from North Carolina State University (8)

PPTX
Updating Operating Systems and Applications
PPTX
Ransomware and Backups
PPTX
PDF
Intimate Partner Violence

Recently uploaded (20)

PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Empowerment Technology for Senior High School Guide
PDF
HVAC Specification 2024 according to central public works department
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Hazard Identification & Risk Assessment .pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Empowerment Technology for Senior High School Guide
HVAC Specification 2024 according to central public works department
FORM 1 BIOLOGY MIND MAPS and their schemes
History, Philosophy and sociology of education (1).pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
LDMMIA Reiki Yoga Finals Review Spring Summer
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Uderstanding digital marketing and marketing stratergie for engaging the digi...
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Share_Module_2_Power_conflict_and_negotiation.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Unit 4 Computer Architecture Multicore Processor.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Hazard Identification & Risk Assessment .pdf

Biometrics in Security

  • 2. What are biometrics? ● Biometrics are measurable, unique physical characteristics that are used to identify individuals. ● There are 3 types of biometrics: ○ Biological biometrics: uses traits at a genetic/molecular level to identify individuals (DNA/Blood). ○ Morphological biometrics: uses physical traits or the structure of the body to identify individuals (eyes, fingerprints, or shape of the face). ○ Behavioral biometrics: uses unique behavioral patterns for identification (how the individual walks/talks). ● Common biometrics: ○ Fingerprint scanning ○ Facial recognition ○ Iris recognition ○ Heart-rate sensors ○ Voice recognition ○ Hand geometry recognition https://fcw.com/- /media/GIG/EDIT_SHARED/Cyber/Biometrics/biometrics_shutterstoc
  • 3. How are biometrics used in security? ● Biometric data can be used in technology in place of certain security systems. It can also be used to enhance pre-existing security systems on phones, computers, or even buildings. ● However, in order to be useful, this data must be permanent and able to be collected. ○ This data is encrypted and stored either within the device or on remote servers. ● Biometric systems consist of 3 parts: ○ The sensor: records and reads biometric information for verification of identity ○ The computer: stores information for comparison against stored data ○ The software: links the computer hardware to the sensor to allow for data to be collected
  • 4. Advantages of Biometrics ● Convenience ○ Biometrics make it easier for users to access their devices or personal information. Unlike long and complicated passwords, biometric data such as your fingerprint cannot be lost or changed. ● Privacy ○ Since biometrics cannot be changed, the use of biometric systems ensures that the only people that can access devices or data are the ones that have been given access or permission to do so.
  • 5. Disadvantages of Biometrics ● Accuracy is not Guaranteed ○ Facial recognition can be tricked. Researchers at the University of North Carolina at Chapel Hill conducted an experiment to test five security systems that use facial recognition software. They downloaded photos of 20 volunteers from social media and constructed 3D models of their faces. The researchers were able to breach four out of the five systems. ○ It is also extremely easy to clone fingerprints using just plastic or candle wax, which can be used to unlock devices. ● Software Flaws ○ Hackers could exploit any flaws in biometric system software, leaving user data vulnerable. ○ Passwords can be changed if accounts become unprotected, but biometric data cannot be modified.
  • 6. Disadvantages of Biometrics ● Lack of Federal Laws ○ Currently, there aren’t any cohesive laws in the United States to protect user’s biometric data. Hopefully, as biometrics becomes more common, legislation will be put in place to keep this sensitive data safe. .
  • 7. How can you protect your data? ● It is paramount that you take the proper precautions to keep your data secure. ○ Use biometrics sparingly to keep your biometric data stored in a few places, and opt out of biometric data collection if you want. ○ Keep the software on your devices current as it reduces the probability of your device being vulnerable to security flaws. ○ Use two-factor authentication on accounts to add an extra layer of protection onto your accounts (visit our Two-Factor Authentication page for more information).
  • 8. Sources ● https://www.kaspersky.com/resource-center/definitions/biometrics ● https://us.norton.com/internetsecurity-iot-biometrics-how-do-they-work-are-they- safe.html ● https://www.ifsecglobal.com/global/biometric-security-systems-guide-devices- fingerprint-scanners-facial-recognition/ ● https://blogs.thomsonreuters.com/answerson/biometrics-technology-convenience-data- privacy/ ● https://www.nedapsecurity.com/insight/biometric-security/