George Turner Effectiveness of Biometric Security CS591 Semester Project 2010 1.

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Vitaly Shmatikov CS 361S Biometric Authentication.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002.
Development of Fingerprint and Iris Authentication Systems in Thailand Dr. Sarun Sumriddetchkajorn Electro-Optics Section, NECTEC Dr. Vutipong Areekul.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
The Role of Computers in Surveillance ~ Katie Hatland.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
CSCI 530 Lab Authentication. Authentication is verifying the identity of a particular person Example: Logging into a system Example: PGP – Digital Signature.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Authentication Approaches over Internet Jia Li
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Encryption Objective 1: Explain data encryption procedures.
SECURITY ENGINEERING 2 April 2013 William W. McMillan.
DigitalPersona, Inc. Biometric Authentication for Digital Authentication Presented by: Brian Farley, Western Sales Regional Manager DigitalPersona.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
1 Information Systems CS-507 Lecture Types of Controls Access Controls – Controlling who can access the system. Input Controls – Controls over how.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
PRESENTATION ON BIOMETRICS
Student Attendance Monitor (SAM) By: Nathan Aldrich.
Biometric Technologies
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Access Control / Authenticity Michael Sheppard 11/10/10.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Retinal & Iris Scanners
CSCI 530 Lab Passwords. Overview Authentication Passwords Hashing Breaking Passwords Dictionary Hybrid Brute-Force Rainbow Tables Detection.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
Face Recognition Technology By Catherine jenni christy.M.sc.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Information Systems Design and Development Security Precautions Computing Science.
DEFEATING BIOMETRIC AUTHENTICATION SYSTEMS Colin O’Hanlon COSC 480 April 11, 2012.
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Biometrics Security in Banking Systems Image processing in ATM
Diane DiLorenzo Cosc 101 section 7
Authentication and Account Management
3.6 Fundamentals of cyber security
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Human–computer interfaces
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Recorder Visual Identification Test
BY: Michael Etse and Maverick Fermill
Presentation transcript:

George Turner Effectiveness of Biometric Security CS591 Semester Project

Abstract Computers need a way to identify and verify user(s) Protect the identity of the user, without exposure to other malicious users Method should be user friendly, or risk losing user base Be able to assure confidence to user that the computer knows who you are 2

Current Technique (Passwords) Pros: – Easy to use, only requires the use of a keyboard – String encryption allows for protection – Users are confident, as this method has been used for 50 years Cons: – Easy to steal, when non-encrypted – Requires constant changing, for better security – Requires complexity, for better security 3

Biometrics Wikipedia: “methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits” Common Types: Fingerprint, DNA, Voice, Retina. Recent and continuing trends in technology make this easier and more accurate 4

Fingerprints Wikipedia: “No two fingerprints have ever been found identical in many billions of human and automated computer comparisons” IAFIS, and other databases already have millions of records Making it’s way onto identification documents, such as driver’s license, and Passports 5

Current Fingerprint Scanners Pros: – Easy to use, only requires a swipe of the finger – Scan is unique for all individuals – Scanners are getting cheaper to make (Mid grade quality for $40) Cons: – Hollywood still portrays as a “vulnerable” technology. – Primary usage is a “password bank” 6

Operating System and Application Integration Integrated with all of the major operating systems: Windows, Linux, Mac, Ubuntu Numerous SDKs for all of the major programming languages (C#, Java, Visual Basic, Delphi, etc.), ranging from Freeware to Full scale business usage 7

Questions? 8