Sei sulla pagina 1di 16

BIOMETRICS AND CYBER SECURITY

Click to edit Master subtitle style

Made by: Isha Arora Ishaan Bhatnagar Ishita Ohri Jai Malhotra Jaideep Bajaj
5/5/12

Cyber Security

Cyber security is the process of preventing and detecting unauthorized use of the computer and network. security helps us determine whether or not someone attempted to break into our system, if they were successful. And what they may have done and what may be the further security.

Cyber

5/5/12

Meaning of Biometrics
The

word "biometrics" is derived from the Greek words 'bios' and 'metric' ; which means life and measurement respectively. This directly translates into "life measurement". authentication)consists of methods for uniquely recognizing humans based upon one or moreintrinsic physical or behavioraltraits. science, in particular, biometrics is used as a form ofidentity access managementandaccess control.
5/5/12

Biometrics(orbiometric

Incomputer

Features of Biometrics
v

Unique Can not be shared Can not be copied Can not be lost

5/5/12

Need for Biometrics Security

The consequences of insecure authentication in various fields can be catastrophic which can leads to loss of confidential data and compromise data integrity. The prevailing techniques of passwords and PINs, can be guessed, stolen or illicitly acquired by convert observation. There is no way to positively link the usage of the system or service to the actual user.

5/5/12

Types of Biometrics
There are two types of biometrics:
a. b.

Behavioral Biometrics Physical Biometrics

5/5/12

Behavior Biometrics
Behavioral biometrics basically measures the characteristics which are acquired naturally over a time. It is generally used for verification. Example: * Speaker Recognition - analyzing vocal behavior * Signature - analyzing signature dynamics * Keystroke - measuring the time spacing of typed words

5/5/12

Physical Biometrics
Physical biometrics measures the inherent physical characteristics on an individual. It can be used for either identification or verification. Examples: * Bertillon age - measuring body lengths (no longer used) * Fingerprint - analyzing fingertip patterns * Facial Recognition - measuring facial characteristics * Hand Geometry - measuring the shape of the 5/5/12

5/5/12

Advantages of Biometrics

Increase security - Provide a convenient and low-cost additional tier of security. Reduce fraud by employing hard-to-forge technologies and materials. For e.g.Minimise the opportunity for ID fraud, buddy punching. Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. For e.g. Prevent unauthorized use of lost, stolen or "borrowed" ID cards. Reduce password administration costs. Replace hard-to-remember passwords which may be shared or observed. Integrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access. Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN! Unequivocally link an individual to a transaction or event.

5/5/12

5/5/12

Disadvantages
The

finger print of those people working in Chemical industries are often affected. Therefore these companies should not use the finger print mode of authentication. is found that with age, the voice of a person differs. Also when the person has flu or throat infection the voice changes or if there are too much noise in the environment this method may not authenticate correctly. Therefore this method of verification is not workable all the time.
5/5/12

It

Devices

Optical Fingerprint Scanner - Integrated Access Control and Time Attendance System Fingerprint Safes5/5/12

OptiMouse iGuard

Personal

Case study
Iris Scanning Identifies Inmates At a county prison in Pennsylvania, inmates are

verified by iris recognition before they are released from prison at the end of their sentences and for routine events such as court appearances and medical visits. Iris recognition gives prison officials absolute assurance that the right inmate is being released and eliminates the risk of human error in matching a face with a photo identification. Inmates enroll by standing in front of a camera and looking into the lens. The iris image is captured and stored in an inmate records database. Before release, inmates simply look
5/5/12

Conclusion

Biometric authentication is highly reliable, because physical human characteristics are much more difficult to forge then security codes, passwords and hardware keys. Biometrics holds the promise of fast, easy, accurate, reliable and less expensive authentication for a variety of application. Where biometric security systems can offer a high degree of security, but they are far from perfect solutions.
5/5/12

5/5/12

Potrebbero piacerti anche