Security Implications of Biometrics
description
Transcript of Security Implications of Biometrics
![Page 1: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/1.jpg)
Colin Dougherty
![Page 2: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/2.jpg)
What is it? Oldest form of identification Unique identifiers…not secrets!
![Page 3: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/3.jpg)
Examples of Biometrics Physiological
FaceFingerprintIris and RetinalHand VeinsDNA
BehavioralVoiceSignature
![Page 4: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/4.jpg)
Comparison of Biometrics Uniqueness Permanence Collectability Performance Circumvention
![Page 5: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/5.jpg)
Facial Recognition Primer Principal components analysis Viisage’s “EigenFaces”
![Page 6: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/6.jpg)
Real World Error Rates
False PositivesFalse Negatives
Airport BiometricsFace Recognition
![Page 7: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/7.jpg)
Fujistu’s Palm Vein Biometric Infrared Rays False Negative = 0.01% False Positive = 0.00008%
![Page 8: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/8.jpg)
Attacks and More Problems Verify accuracy and input correctly Replay Attacks Human Risk Poor Failure
Cancelable Biometrics
![Page 9: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/9.jpg)
MythBusters Defeat a Fingerprint Scanner
Copy of the fingerprint etched in latex.Ballistics gel copy of the fingerprint.Paper copy the fingerprint.
![Page 10: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/10.jpg)
Summary Security is in layers
Biometrics have strengths
Biometrics have weaknesses
Biometrics are unique identifiers not secrets!
![Page 11: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/11.jpg)
Sources Secrets & Lies, Digital Security in a
Networked World. Bruce Schneier. John Wiley & Sons, 2000
Jonathan Kent. BBC News, Kuala Lumpur: http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm
Worcester Polytechnic Institute. Viisage http://www.wpi.edu/News/Transformations/2002Spring/recognition.html
![Page 12: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/12.jpg)
Questions What are two ways of comparing
different Biometrics?
Fill in the blank: Biometrics are unique identifiers not ___________!
![Page 13: Security Implications of Biometrics](https://reader036.fdocuments.in/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/13.jpg)
Colin Dougherty