Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.

Slides:



Advertisements
Similar presentations
Lecture 6 User Authentication (cont)
Advertisements

1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?
Crime and Security in the Networked Economy Part 4.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (7) AUTHENTICATION.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Security, Privacy, and Ethics Online Computer Crimes.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Smart card based authentication and identity management Lecture 4.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Bank Crime Investigation Techniques by means of Forensic IT
Discovering Computers 2010
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Karthiknathan Srinivasan Sanchit Aggarwal
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
PART THREE E-commerce in Action Norton University E-commerce in Action.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
C8- Securing Information Systems
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Information Security What is Information Security?
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Biometrics Authentication Technology
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Topic 5: Basic Security.
G53SEC 1 Authentication and Identification Who? What? Where?
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Chap1: Is there a Security Problem in Computing?.
Welcome Topic : Security.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
1 Pertemuan 8 Internal Control System Matakuliah:A0274/Pengelolaan Fungsi Audit Sistem Informasi Tahun: 2005 Versi: 1/1.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
INFORMATION SECURITY AND CONTROL. SECURITY: l Deter l Detect l Minimize l Investigate l Recover.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
An Introduction to Biometrics
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Access control Presented by: Pius T. S. : Christian C. : Gabes K. : Ismael I. H. : Paulus N.
3D Password.
Challenge/Response Authentication
Add video notes to lecture
Challenge/Response Authentication
Chapter 17 Risks, Security and Disaster Recovery
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Welcome To Money pad November 23, 2018 Sample footer.
Asst. Prof. Arvind Selwal, CUJ,Jammu
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Presentation transcript:

Biometric Authentication Andrea Blanco Binglin Li Brian Connelly

What is Biometric Authentication Biometrics Authentication is associated with utilization of distinctive physiological characteristics for identifying individuals. Biometrics Authentication can be used in almost any application that requires the accurate identification of an individual. This ranges from computers where a fingerprint scan on the mouse can verify the identity of a user to nuclear power plants where various biometrics are used to restrict access to the critical systems.

Types of Biometric Authentication

How does Biometric Authentication work

Example of Fingerprint Enrollment How does Biometric Authentication work

Example of Fingerprint Verification How does Biometric Authentication work

Advantages No need to remember: Special access codes Required password No need to carry: Physical access cards Personal Identification such as driver licenses Creates more difficulty in counterfeiting personal identification details due the fact that biometrics are not easily lost, stolen, hacked, duplicated, or shared. Biometrics amplify existing security techniques like password requirements.  Office of Biometric Identity Management Identification Services “ To authenticate, users have to supply a password ("something they know") as well as information from a second factor – typically "something they have," such as a one-time password generator token.” 1 1

Biometrics Strengths and Considerations

Risks and Controls DefinitionControls Spoofing and Mimicry Attacks Artificial finger made with silicon, pictures and speech synthesis tools can deceive the sensor. Interactive authentication and/or vitality detection Server Side – Fake Template Risks On server-based architecture,an impostor can insert a template under someone else’s name Strong security policy, encryption, preventive and detective controls Communication Links Risks Data could be captured from the communication channel and used another time to gain access System integration and/or rejection of identical signals Component Alteration Risks A Trojan Horse can act as a manipulator of each component’s output Strong security policy, system integration into one hardware security module

Risks and Controls (Cont…) DefinitionControls Noise and Power Loss Risks Power fluctuation or flooding of a biometric sensor with noise data Well-implemented security policy Enrollment, administration, and system use risk Poor enrollment, system administration and system use procedures increase the risk Well designed and implement security policy and procedures Residual Characteristic Risk Residual biometric of a previous user is sufficient to allow access Technology assessment and interactive authentication Similar Template – Similar Characteristics Risk A fraudulent user who has similar characteristics to a legit user can deceive the system Technology assessment and calibration review

Residual Risks Criminals may use the information stored on advanced systems to commit crimes and compromise the safety and security of individuals. Countries may opt to share the information gathered on individual personal identification details Violation of privacy, safety and constitutional laws of certain countries.

Example Risk Video