Under lock and key – keeping sensitive data where it belongs

3
10 Biometric Technology Today May 2010 Under lock and key – keeping sensitive data where it belongs addressed in the international arena, but also pointed out that, rather than the strict regulation of a virtual and ubiquitous environment, the bottom-up approach based on building private and public awareness on cyber-risks and cyber- opportunities still remains the best option. Conclusions: a debate to be continued Emerging technologies could act as strong empowering tools, but their deployment often raises critical ethical and policy issues that need to be constantly addressed. While set- ting and implementing security policies, such as the inclusion of biometric technologies in e-ID documents and the creation of centralised online databases, or the deployment of body scanners at airport security checkpoints, the rationale for political decisions must be strongly linked to fundamental human rights and freedoms. The real and critical question is: what kind of society do we wish to live in? The RISE workshop addressed the need to cre- ate a new sense of responsibility for individuals and states, in order to find the balance between security, privacy and other fundamental human rights. In the European Union, a uniform approach to the definition of security priorities, as well as the man- agement of e-identities, needs to be further devel- oped. In these tasks, the involvement of relevant stakeholders in a constant, multi-disciplinary, inter- national debate plays a crucial role: the dialogue initiated during the March workshop will continue during the next RISE workshops, to be held in September and December 2010. About the author Silvia Venier has a background in international political sciences (University of Trieste) and serves as a research assistant at the Centre for Science, Society and Citizenship, where she is in charge of the RISE and HIDE projects. References 1. India’s UID programme: http://uidai.gov.in 2. Decision Nº 922/2009/EC of the European Parliament and of the Council of 16 September 2009 on Interoperability Solutions for European Public Administrations (ISA) 3. Stork: www.eid-stork.eu 4. HIDE: www.hideproject.eu 5. European Parliament Resolution of 23 October 2008 on the impact of aviation security measures and body scanners on human rights, privacy, personal dignity and data protection, RSP/2008/2651 FEATURE CSSC The Centre for Science, Society and Citizenship (CSSC) is an independent, non- partisan, human impact research company specialising in the social, cultural and ethical implications of emerging technologies in vari- ous fields (eg, homeland security, biometrics and e-ID, smart ambient, ubiquitous com- puting, cloud computing, disaster prepared- ness, public health, eInclusion). CSSC’s track record of research, partnering and networking has made it a leading European institution in the area of science and society. CSSC serves as a member of the Fundamental Rights Platform of the Fundamental Rights Agency of the European Union (FRA). The Centre is also a mem- ber of the European Association of Centres of Medical Ethics (EACME) and of the International Association of Bioethics (IAB). CSSC is an associate member of the Italian Confederation of Education and Knowledge Companies (Assoknowledge), where it leads the sector group on biometrics. CSSC carries out its work in several ways, including studies, publications, training and coordination of multicenter research projects. For more information, go to: www.cssc.eu Authenticating each user before he or she is granted access to the corporate network is a challenge that faces CIOs across the globe on a daily basis. With the threat of data theft and hacking rife, organisations know they need to improve security at the point of access, whether this is from inside the organisation’s building or from mobile devices that are play- ing an increasingly pivotal role in the modern business IT infrastructure. The trend towards using externally hosted web applications will only further increase the password headache for end users and administrators alike. Technologies such as Single Sign-On are being widely adopted in organisations where it is clear that the number of passwords the user has to deal with every day has spiralled out of control. However, this kind of technology is most effective when combined with strong authentication devices that include fingerprint biometrics as well as smartcards and password tokens. This results in two-factor authentica- tion that can increase security and improve workflow if the right method of authentication is selected in the right environmental setting. Huge flexibility The biometric scanners we see today offer huge flexibility and come mounted on keyboards, notebooks, electronic door locks and safes. They are often direct imaging silicon sensors capable of producing high-quality images with a very small footprint, differing hugely from the earlier generations of fingerprint scanners that were only commonly adopted on civil biometrics programmes. The growth in demand for biometrics as a factor of authentication stems from venience. As security threats grow and security regulations become more rigid, David Ting

Transcript of Under lock and key – keeping sensitive data where it belongs

Page 1: Under lock and key – keeping sensitive data where it belongs

10Biometric Technology Today May 2010

Under lock and key – keeping sensitive data where it belongs

addressed in the international arena, but also pointed out that, rather than the strict regulation of a virtual and ubiquitous environment, the bottom-up approach based on building private and public awareness on cyber-risks and cyber-opportunities still remains the best option.

Conclusions: a debate to be continuedEmerging technologies could act as strong empowering tools, but their deployment often raises critical ethical and policy issues that need to be constantly addressed. While set-ting and implementing security policies, such as the inclusion of biometric technologies in e-ID documents and the creation of centralised online databases, or the deployment of body scanners at airport security checkpoints, the rationale for political decisions must be strongly linked to fundamental human rights and freedoms. The real and critical question is: what kind of society do we wish to live in?

The RISE workshop addressed the need to cre-ate a new sense of responsibility for individuals and states, in order to find the balance between security, privacy and other fundamental human rights. In the European Union, a uniform approach to the definition of security priorities, as well as the man-

agement of e-identities, needs to be further devel-oped. In these tasks, the involvement of relevant stakeholders in a constant, multi-disciplinary, inter-national debate plays a crucial role: the dialogue initiated during the March workshop will continue during the next RISE workshops, to be held in September and December 2010.

About the authorSilvia Venier has a background in international political sciences (University of Trieste) and serves as a research assistant at the Centre for Science, Society and Citizenship, where she is in charge of the RISE and HIDE projects.

References

1. India’s UID programme: http://uidai.gov.in 2. Decision Nº 922/2009/EC of the European

Parliament and of the Council of 16 September 2009 on Interoperability Solutions for European Public Administrations (ISA)

3. Stork: www.eid-stork.eu 4. HIDE: www.hideproject.eu 5. European Parliament Resolution of 23

October 2008 on the impact of aviation security measures and body scanners on human rights, privacy, personal dignity and data protection, RSP/2008/2651

FEATURE

CSSC

The Centre for Science, Society and Citizenship (CSSC) is an independent, non-partisan, human impact research company specialising in the social, cultural and ethical implications of emerging technologies in vari-ous fields (eg, homeland security, biometrics and e-ID, smart ambient, ubiquitous com-puting, cloud computing, disaster prepared-ness, public health, eInclusion). CSSC’s track record of research, partnering and networking has made it a leading European institution in the area of science and society.

CSSC serves as a member of the Fundamental Rights Platform of the Fundamental Rights Agency of the European Union (FRA). The Centre is also a mem-ber of the European Association of Centres of Medical Ethics (EACME) and of the International Association of Bioethics (IAB). CSSC is an associate member of the Italian Confederation of Education and Knowledge Companies (Assoknowledge), where it leads the sector group on biometrics.

CSSC carries out its work in several ways, including studies, publications, training and coordination of multicenter research projects.

For more information, go to: www.cssc.eu

Authenticating each user before he or she is granted access to the corporate network is a challenge that faces CIOs across the globe on a daily basis. With the threat of data theft and hacking rife, organisations know they need to improve security at the point of access, whether this is from inside the organisation’s building or from mobile devices that are play-ing an increasingly pivotal role in the modern business IT infrastructure. The trend towards

using externally hosted web applications will only further increase the password headache for end users and administrators alike.

Technologies such as Single Sign-On are being widely adopted in organisations where it is clear that the number of passwords the user has to deal with every day has spiralled out of control. However, this kind of technology is most effective when combined with strong authentication devices that include fingerprint

biometrics as well as smartcards and password tokens. This results in two-factor authentica-tion that can increase security and improve workflow if the right method of authentication is selected in the right environmental setting.

Huge flexibility The biometric scanners we see today offer huge flexibility and come mounted on keyboards, notebooks, electronic door locks and safes. They are often direct imaging silicon sensors capable of producing high-quality images with a very small footprint, differing hugely from the earlier generations of fingerprint scanners that were only commonly adopted on civil biometrics programmes.

The growth in demand for biometrics as a factor of authentication stems from

venience. As security threats grow and security regulations become more rigid,

David Ting

Page 2: Under lock and key – keeping sensitive data where it belongs

11May 2010 Biometric Technology Today

These older optical devices used video camer-as, mirrors, prisms and lenses to obtain an image of a fingerprint and found it difficult to capture prints under all conditions. Combining modern biometrics technology with password authentica-tion therefore has a strong value proposition, particularly as more and more industry and gov-ernment regulations require two-factor authenti-cation and audit trails for access reporting. The convenience of using a simple finger swipe or touch to access all the applications you need each day is huge – especially if the user is required to repeatedly logon and logoff.

The fundamental idea behind biometric systems is that while you could share your pass-word, a password token or even a swipe card, you can’t share your fingerprint: thus biometric devices have built a solid reputation for being one of the strongest and most accurate ways of authenticating a user.

Unlike a card, token or password, a biometric print is extremely difficult to duplicate and this security has offered enterprises of all sizes a unique level of authentication. Additionally, as many leading PC vendors now include high-quality biometric readers as standard on laptops, these devices can be integrated with access-man-agement solutions simply and inexpensively.

The benefit of biometric authentication, however, extends to the flexibility of the authentication modality to provide greater security, whether accessed through the network locally, via remote VPN or while working offline. With the biometric readers now being offered on laptops by Dell, Lenovo, HP, Fujitsu, Panasonic, Motion and other manufacturers (which use embedded UPEK or Authentec swipe sensors, as well as support for external UPEK and Authentec USB readers that organi-sations can mix and match on workstations

or personal desktop machines) users can now select the device to suit their needs, at a price point that matches budget restrictions.

Although security and cost remain primary con-cerns at management level, an increasing number of businesses now realise that the success of any access security infrastructure is ultimately determined by the rate of adoption by the user. The technology in place needs to fit seamlessly into the working prac-tices of the staff, enhancing workflows and making life easier wherever possible.

If this simplicity can be achieved, and the authentication process is not onerous for users, there will be no temptation to cut security cor-ners when accessing confidential data. Even the best security measure can be defeated by end users if it is seen as cumbersome or interfering with user productivity. After all, users are not measured based on whether they have been security conscious, but on how productive they have been at their primary function.

With this in mind, biometrics as a form of authentication has yet another benefit. Biometrics are very quick and easy to use, and unlike proximity cards and readers, a user’s biometric cannot be easily lost or forgotten – common complaints with device-based tokens.

Key pointsThere are other key points that should also be considered when exploring biometrics as a method for authentication:

-nology is embedded into the commercial product you are looking at – there are many solutions out there, and some cost more than they should, so keep an eye out for the bal-ance between cost and system capabilities.

‘False Accepts’ and ‘False Rejects.’ Although it is impossible to guarantee that there won’t ever be a false accept, keeping the rate better than 1 in 1 million is important. Some personal-use systems, for example, provide a false accept-ance rate of only 1 in 1,000 – good enough for home use but certainly not for enterprise use.

-thing they want to get done quickly so they can get their job done, so identifica-tion or authentication speed is paramount. Acceptable time for authentication (where you enter a user name) should be with-in 1 second and identification (where you don’t enter a username), within 2-3 seconds. Consider the verification speeds of integrated Single Sign-On biometrics solutions and do a head-to-head comparison of the best options.

range of finger image presentation with a higher degree of accuracy. Users don’t put their fingers at the same angle, position within the sensor or swipe the same way as they did dur-ing enrolment, so having a robust solution that can handle variability ensures user adoption. Test the system to see what finger placements are allowed to gauge the user experience – try placing the finger at a different angle or swipe at different speeds. Test with dry, moist, dirty, or oily fingers and above all, try using it by touch alone with your eyes closed.

Compromised computersIt is safe to assume that a determined or know- ledgeable hacker will be able to break the pass-word logon for a lost computer using a variety of ‘recovery tools’ designed to crack the offline store of hashed passwords used for local authentication.

These tools rely on sequencing combinations of passwords until they match the stored hash codes associated with the original user password, and because of the lack of entropy or randomness in most passwords, they are extremely effective and surprisingly quick. Complex passwords made with random characters, interspersed with special char-acters and numbers take considerably longer to break but many users don’t use complex passwords because they are difficult to remember – especially if they have to be changed frequently.

Once the Window’s password is ‘recovered’ it is easy to log on to the computer to gain access to even encrypted Windows folders on the machine and potentially join the computer to the corporate network. This is why it is mandatory to change the user’s domain credentials as soon as possible when a computer is stolen. Any computer that is lost should be assumed to be compromised and appropriate security precautions should be taken

Continued on page 12...

FEATURE

“The benefit of biometric authentication extends to the flexibility of the authentication modality to provide greater security, whether accessed through the network locally, via remote VPN, or while working offline.”

Page 3: Under lock and key – keeping sensitive data where it belongs

12

NEWS/COMMENT

Biometric Technology Today May 2010

...Continued from page 11to review access logs and to change appropriate account logons for the affected user.

Biometric authentication compares the biometric data for an unknown user against one or more reference data captured during user enrolment. The matching algorithm converts a captured image – eg: of a finger – to a digital signature that is then used in a fuzzy compari-son against the enrolled data.

The large number of pixels involved in the image (several hundred Kbytes) together with the randomness of the finger being scanned results in the creation of, effectively, a long ‘pass-word’ with a significant amount of randomness. This makes the biometric password extremely difficult to recover using brute force attacks.

In effect this task can be compared to trying to create an image of a fingerprint by systemati-cally setting pixels in an image to different grey values until a print is generated and compared. Of course this also assumes that you can gain access to the enrolled fingerprint data, which can either be totally server resident or be encrypted and stored locally. All this is considerably more dif-ficult than downloading a password recovery tool and letting it go on a file of hashed passwords.

When securing mobile devices, passwords have to be particularly complex to thwart cracking and yet most users don’t use strong passwords because they’re inconvenient. This creates a challenge not only for the primary Windows logon but also applications served out over the intranet – or, with increasing popular-ity, via Software as a Service (SaaS) providers.

When it comes to protecting the corporate network, the challenge is therefore to use access-management tools that can delegate the creation and entry of complex passwords and isolate the user from knowing about the password in the first place. These tools, layered with strong authentication such as biometrics, which secure access to the Windows log-on, provide addition-al security and – in the event that the machine is lost – offer a higher barrier to systematic crack-ing. This ultimately means more protection for the end-user and the sensitive data at hand.

About the author

David Ting is the founder and CTO of Imprivata (www.imprivata.com). He has more than 20 years experience in developing advanced imaging software and systems for high-security, high-availability systems and was named one of Infoworld’s Top 25 CTOs of 2006. Prior to founding Imprivata, he devel-oped biometric applications for government programmes and web-based applications for secure document exchange. He holds six patents and has several patents pending. Ting regularly blogs at Identity 360 – blog.imprivata.com

...News continued from page 5

recognition technologies typically being used in small-scale projects. The cost per scan in India’s ambitious scheme to produce biometric IDs for all 1.2 billion citizens will be much lower, UIDAI says, due to economies of scale. This will help bring down the cost of both hardware and software, it asserts.

The paper also says that iris scanning is a necessity. In the kinds of environments in which biometric enrolment will take place, it believes that fingerprint scanning will not achieve the level of quality necessary to ensure uniqueness and bring false acceptance rates down to an acceptable level. “The logistics of going back and re-enrolling residents [where] the biometrics set is insufficient would be unacceptable,” it said.

The UID project itself has also undergone a name change. It was thought that the UID acronym was too abstract and confusing, and the programme will now be known as Aadhaar (chosen because it works in all regional lan-guages).

Pakistan and Afghanistan to use biometric border system

Two key border crossing points between Pakistan and Afghanistan will

be equipped with biometric ID systems, according to a joint statement issued by the two countries’ governments.

The two countries share a 2,000km border, but Torkham and Chaman are the official cross-ing points recognised by both sides.

People who live close to the border are accustomed to moving freely across it but Afghanistan has complained that its people are being hindered by Pakistani border secu-rity officials while militants frequently move into the country from Pakistan. However, it’s Afghanistan that has been reluctant, until now, to implement more formal monitoring systems.

The move to implement a biometric sys-tem follows talks in Dubai and forms part of the G8 Afghanistan Pakistan Border Region Prosperity Initiative that was also agreed there.

Immigration reforms proposed by US Senators Charles Schumer (D) and Lindsey Graham (R) have certainly set the cat among the pigeons. The

senators want to introduce biometric Social Security cards as a way of preventing illegal immigrants from getting jobs.

The other three parts of their four-pillar programme are: “Fulfilling and strengthening our commitments on border security and interior enforcement; creating a process for admitting temporary workers; and implementing a tough but fair path to legalisation for those already here.”

There’s plenty of room for heated debate in any one of those proposals. But it’s the idea of introducing what would, in effect, be a biometric ID card that has boosted the blood pressures of pundits and activists across the political spectrum.

The proposals would require all workers in the US to carry a smartcard encoded with their fingerprints, which could be matched against a central ‘work authorisation’ database.

Right-wingers see creeping government control. And so, for that matter, do the lobbyists and civil liberties activists who would normally find themselves on the other side of the argument. For example, the American

Civil Liberties Union (ACLU), the American Libraries Association and about 40 other groups and individuals signed a joint letter sent to the White House urging the abandonment of the reforms and characterising the introduction of biometric ID cards as an invasion of privacy and a worrying extension of government powers, as well as being risky and expensive. It calculated the cost at $285bn.

“A National ID would not only violate privacy by helping to consolidate data and facilitate tracking of individuals,” said the letter, “it would bring government into the very center of our lives by serving as a government permission slip needed by everyone in order to work.”

The bill is still in the draft stages and is likely to run into opposition at many levels. For example, it supports the Immigration and Customs Enforcement (ICE) programme, used by police forces to check the fingerprints of anyone they arrest against a central database to check the person’s immigration status. ICE has come in for a lot of criticism even as it is being rapidly adopted by an increasing number of police departments.

Immigration reform was always bound to be a touchy subject. But it seems that the introduction of biometrics into the debate has significantly increased the ferocity of the argument.

Steve Mansfield-Devine

COMMENT

border control