Download presentation
Presentation is loading. Please wait.
Published byHomer Rodgers Modified over 9 years ago
1
N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002
2
N Stage Authentication n Outline –Background on Authentication –General Network Security –Need for High Grade Authentication –Need for Multiple Factor Authentication –Background on Error Types –Forms of Biometric Authentication –Pros and Cons of Each Biometric Technology –What’s Hot? What’s Not? –Major Players –Network Management with Biometric Devices –Problems –Proper Network Security with Biometric Devices –Demos and Discussion –Prognosis
3
Background on Authentication
4
Identification n The method used by a system (not necessarily a computer) to uniquely identify an individual or group. Examples: User names, Driver’s License, School ID, Security Badge, Passport
5
Authentication n The method(s) used to verify the given identification against a database of known information. Examples: Passwords, Fingerprints, Iris Prints, Negotiation
6
Development of Authentication n What you know… n What you have… n What you are… n Future Development: How you are...
7
General Network Security
8
Security is NOT n Installing a firewall n A product or Service n Running an audit and shutting things off
9
Security IS n Working productively and without interruptions n Only as good as the weakest link n Risk management of resources (equipment, people) n Physical security n A process, methodology, policies and people n Is 24x7x365
10
General Network Security n No silver bullet to network security n Replay attacks n Denial of Service ((D)DoS) n Spoofing n Users n Dictionary Attacks
11
Security Thoughts n 80-90% are internal issues n Hard drive crash (what did you loose, and how long to get back up?) n Firewall penetration (what can they do, what do they see?) n Internet failed (how much lost productivity/revenue, backup net connection?) n Some can always get in
12
General Network Security Conclusion n Biometrics will help but will not solve all problems n Users are the “weakest link” n Proactive security plan
13
Need for High Grade Authentication
14
n High Security Areas n Multiple Factor Authentication n Challenge and Response Authentication n High Assurance of Proper Identification n Data Retrieval Based on the Person
15
Background on Error Types
16
Type I Error --- Accept in Error n Balance Between Type I and Type II Error n Most Dangerous n High Exposure n Preventable n Need for Additional Security Measures
17
Type II --- Deny in Error n Balance Between Type I and Type II Error n Only an Inconvenience n Prventable n Established by a High Security Policy
18
Forms of Biometric Authentication
19
Forms of Biometric Devices n Fingerprint Scanners n Retina Scanners n Iris Scanners n Voice Print Scanners n Handwriting Recognition n Face Recognition n Personal Geometry n DNA
20
Pros and Cons of Each Biometric Technology
21
Fingerprint Scanners n Pros n Cons
22
Retina Scanners n Pros n Cons
23
Iris Scanners n Pros n Cons
24
Voice Print Scanners n Pros n Cons
25
Handwriting Recognition n Pros n Cons
26
Personal Geometry n Pros n Cons
27
Face Recognition n Pros n Cons
28
DNA n Pros n Cons
29
What’s Hot? What’s Not?
30
What’s Hot? n Fingerprint Scanners n Iris Scanners n N Stage Authentication n Interoperability n Interchangeability n Standards n Server Signature Storage
31
What’s Not? n Retina Scanners n DNA n 1 or 2 Stage Authentication
32
Major Players
33
n Most ISP NOCs n Healthcare Organizations n Banking Industry n Military/Government Agencies n Department of Defense n Schools?
34
Network Management with Biometric Devices
35
Cost n Fingerprint Scanner --- $100-150 n Retina Scanner --- $400-500 n Iris Scanner --- $200-300 n Voice Print Scanner --- $150-200 n Face Recognition --- $150-250
36
Ease of Deployment n Fingerprint Scanner --- Easy n Retina Scanner --- Hard n Iris Scanner --- Hard n Voice Print Scanner --- Medium n Face Recognition --- Easy
37
Ease of Management n Fingerprint Scanner --- Easy n Retina Scanner --- Medium n Iris Scanner --- Medium n Voice Print Scanner --- Easy n Face Recognition --- Medium
38
User Effects n Fingerprint Scanner --- Medium n Retina Scanner --- Medium n Iris Scanner --- Medium n Voice Print Scanner --- High n Face Recognition --- Medium
39
Problems
41
Proper Network Security With Biometric Devices
42
Securing Biometric Signatures n Tamper resistant storage n Protection from corruption n Secure signature changes n Secure backups n Stop signature interception n Protect latent signatures
43
Logon Security n Trusted Path to the authentication device n Tamper resistance n Clear or encrypted transmission n Continuous monitoring n What “goes down the wire”? n Real biometric?
44
Bypass Prevention n Tamper resistance at the local machine n Enhanced biometrics to tell a real biometric from a fake biometric n Both biometrics and passwords needed
45
Consistency n Environmental effects n All network users adhere to the same policy n All network machines configured identically
46
Can Biometrics be Bypassed? n How they are connected n The device can be fooled n Consistency
47
Demos and Discussion
48
Demo of Fingerprint Scanner Authentication
49
Demo of Iris Scanner Authentication
50
Wire Capture Analysis
51
Recent Bypassing Methods
52
How to Bypass
53
Question and Answer
54
Thanks To: n Dr. Blaine Burnham, Director of NUCIA n Defcon 10 n Peter Kiewit Institute n Dan Devries
55
Contact Info n E-Mail: nrotschafer@geniussystems.net n Slides: http://www.geniussystems.net –Goto the :. Talks.: section and then to the “Biometrics” folder then to the “Defcon” folder and download the.ppt slides of the presentation.
56
Links n http://www.theregus.com/content/55/24956.html http://www.theregus.com/content/55/24956.html n http://www.heise.de/ct/english/02/11/114/ http://www.heise.de/ct/english/02/11/114/ n http://www.precisebiometrics.com/ http://www.precisebiometrics.com/ n http://www.saflink.com/ http://www.saflink.com/ n http://stat.tamu.edu/Biometrics/ http://stat.tamu.edu/Biometrics/ n http://www.biometrics.org/ http://www.biometrics.org/ n http://biometrics.cse.msu.edu/ http://biometrics.cse.msu.edu/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.