Biometric Authentication

Slides:



Advertisements
Similar presentations
A Common Language for Computer Security Incidents John D. Howard, Thomas A. Longstaff Presented by: Jason Milletary 9 November 2000.
Advertisements

Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Biometric Cryptosystems Presenters: Yeh Po-Yin Yang Yi-Lun.
By: Monika Achury and Shuchita Singh
1 An Overview of Computer Security computer security.
Chapter 1: Introduction Components of computer security Threats Policies and mechanisms The role of trust Assurance Operational Issues Human Issues Computer.
Keystroke Biometric : ROC Experiments Team Abhishek Kanchan Priyanka Ranadive Sagar Desai Pooja Malhotra Ning Wang.
Chapter 3 Passwords Principals Authenticate to systems.
Biometrics 101 You are the Key. A Need for Better Security One person can have a greater negative impact on society than ever before. More individuals.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
PALM VEIN TECHNOLOGY.
Chapter 9 Security Authentication Insider Attacks Exploiting Code Bugs.
Chapter 5 Basic System Errors (Alireza Tavakkoli).
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Biometrics and Authentication Shivani Kirubanandan.
Risk Management Vs Risk avoidance William Gillette.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
Biometric Authentication Presenter: Yaoyu, Zhang Presenter: Yaoyu, Zhang.
Lecture 3: Access Control Fred Chong CS290N Architectural Support for Secure and Reliable Computing.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
The Protection of Information in Computer Systems Part I. Basic Principles of Information Protection Jerome Saltzer & Michael Schroeder Presented by Bert.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Operating system Security By Murtaza K. Madraswala.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
G53SEC 1 Authentication and Identification Who? What? Where?
Organizational Risk and the Costs and Benefits of Biometrics Presentation to the European Union Biometrics Group May 14, 2004 Virginia Franke Kleist, Ph.D.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
(Team 1)Jackie Abbazio, Sasha Perez, Denise Silva and Robert Tesoriero (Team 2) Faune Hughes, Daniel Lichter, Richard Oswald and Michael Whitfield Clients:
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
G53SEC 1 Authentication and Identification Who? What? Where?
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Intro This paper explores various authentication systems to see if it is possible for any one of them to be deemed cheap, practical and secure enough to.
Biometric for Network Security. Finger Biometrics.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
1 Authentication Technologies Authentication Mechanisms –Something you know –Something you have –Something you are Features –Authenticator & Base secret.
An Introduction to Biometrics
Tom Face Recognition Software in a border control environment: Non-zero-effort-attacks' effect on False Acceptance Rate.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information Muye Liu, Avishek Mukherjee, Zhenghao Zhang, and Xiuwen Liu Florida.
CS457 Introduction to Information Security Systems
Moral Theory Review.
Port Knocking Benjamin DiYanni.
Theodore Lawson CSCE548 Student Presentation, Topic #2
Network Security Marshall Leitem 11/30/04
FACE RECOGNITION TECHNOLOGY
Operating system Security
Biometrics.
Two Way Authentication
Financial Principles and Project Cost Management
Biometrics.
Strong Password Authentication Protocols
Presented by: k.ramya krishna
Faculty of Science IT Department Lecturer: Raz Dara MA.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Copyright Gupta Consulting, LLC.
Chapter Goals Discuss the CIA triad
Neural Network Typing Authentication
Presentation transcript:

Biometric Authentication Luke Hollen

Overview Basic Principles of Authentication Biometrics Weaknesses Evaluation Criteria

Authentication Three Types Something the User Has Something the User Knows Something the User Is

Biometrics Something the User Is Classes of Biometrics Physical Biometrics Behavioral Biometrics

Biometrics Basic Biometric Authentication Processes Enrollment / Profile Creation Factor Submission Profile Comparison Variance Tolerance Admission / Denial

Weaknesses Spoofing An attack whereby one person successfully masquerades as another to gain illegitimate access. Mythbusters

Evaluation Criteria Security Feasibility Measurement of the success of the biometric authentication system at providing access control. Feasibility Measurement of the difficulty of implementing a particular biometric authentication system as an access control method.

Evaluation Criteria: Security False Positive Falsely accepting a biometric factor as matching a defined profile. Liveness Detection Detecting that a biometric factor presented is actually part of a living person. Can still be fooled.

Evaluation Criteria: Feasibility Ease-Of-Use False Negative: Falsely rejecting a biometric factor that does match a defined profile User Inconvenience Scale 5 Users vs. 500 Users Cost Biometric units are not cheap Residential Door Locks start at $200

Questions