Home > Information technology essays > Implementing authentication biometrics as an additional security measure

Essay: Implementing authentication biometrics as an additional security measure

Essay details and download:

  • Subject area(s): Information technology essays
  • Reading time: 7 minutes
  • Price: Free download
  • Published: 17 March 2019*
  • Last Modified: 23 July 2024
  • File format: Text
  • Words: 1,958 (approx)
  • Number of pages: 8 (approx)

Text preview of this essay:

This page of the essay has 1,958 words.

Slide 1 – INTRODUCTION

This powerpoint presentation will define biometrics and present the argument for implementing authentication biometrics as an additional security measure for the organization.  The presentation will evaluate each of the listed methods identifying the pros and cons of each system.  Additionally, information regarding the costs associated with implementation and maintenance, and the error rate of each will be included in this presentation.  Security authorization and identity have become one of the major ways that cybercriminals can attack and cause threats.  If identity and security authorization with compromised credentials being a significant enabler in successful attacks.

Bhargav-Spantzel, (2014) Portend that identity attributes is an important class represented in biometric data.  However, identity verification protocols should be able to support the use of this data (Bhargav-Spantzel, (2014).  Organizations are required to implement reliable ways that continuously determine user credentials. These methods are additional costs for the organization.  Provided in this presentation  are the advantages and disadvantages of biometric systems and how well each method protects the identity the user and organization.  What this presentation will also discuss is that perhaps the most effective way to keep cyber-attacks at a minimum is a blended method of biometric authentication.  This presentation will present some standard methods of biometric security such as fingerprints, voice, and iris and retina biometrics.  Some newer biometric solutions such as the heart rate, butt recognition are currently in development.

Slide 2 – Methods of Biometrics

According to Bidgoli, (2012), physiological elements are used in biometric authentication to security measures Bidgoli, (2012).  Bidgoli, (2012) Portend biometric methods have characteristics not included or available in other security measures Bidgoli, (2012). Solutions for identity and authentication need to be easy to implement wherever authentication is required.  Implementing identity and authentication security measures allow organizations to optimize security and mitigate authentication risks.  Attempts have been made to secure systems with strong authentication methods. These efforts sometimes cause issues for the user, and other entry methods found which may increase risk.  Organizations with successful authentication implemented can strengthen their security with the use of the biometric software. Security Biometric Authentication has become more prevalent in the past years.  However, there is always room for improvement.  Recognition of the Face, Identification by Fingerprint, Hand Geometry Biometrics, Retina Scans & Iris Scans, Signature and Voice Analysis.  Some additional forms include DNA; Butt Recognition; The Nymi is a wristband produces an electrocardiogram (ECG), Nose and Ear research has produced Biometrics considered the cutting edge of identity authentication replacing passwords and pins. Cyber-hackers are continuously finding ways to break through biometric authentication. In the end, what may prove most useful is a mix of methods.  Sophisticated computer network attacks that increase human resource, maintenance and operation costs prompt the need for more advanced security techniques.  Without added measures of security, the networks of organizations everywhere will be increasingly susceptible to additional types of attacks.

Slide 3 – Face Recognition Advantages

Facial recognition biometrics has received a lot of attention over the past few years.  The human face is a unique and important role in identifying who we are.   The use of the human face as a security access key has become one of the more successful biometric tools for organizations.  Facial Biometrics has been implemented and used for a variety of applications in both law enforcement and non-law enforcement.  Facial Biometrics authentication uses the spatial geometry of distinguishing features of the face.  This method can capture facial images from a distance without human interaction.

Some of the Advantages include eliminating the costs of the use of time-keeping with time cards punching in and out.  The second advantage is security enhancement by not allowing anyone not contained in the system to enter or have access.  A third advantage is not having to have an employee physically monitor entry and access because it is automated. Another advantage is that facial recognition is simple to automate.  One last advantage is that implementation has a proven success rate. Face Biometrics assists law enforcement when face images have been recorded and archived.  It can serve as a deterrent to crimes because criminals can be recognized by the archived face recognition system.

Slide 4 – Face Recognition Disadvantages

Although facial recognition has been relatively easy and successful to implement, there are limitations which cause a lack of effectiveness of facial-recognition technology.  Some of the limitations include Image Quality; Image Size; Face Angle; and Processing and Storage:

Image Quality and Image Size are two primary limitations when using facial recognition biometrics.  The software algorithms must be precise for the quality and the size of the images to work well.   The video scanning tools are of a lower quality which is noticeable. And, often the size or resolutions are not of high quality.

The angle of the face has a profound influence on the validity of face authentication biometrics.  Multiple angles must be used in the profile for recognition and if not used affects the algorithms.  Another limitation for face recognition is the processing and storage.  The space required for images is significant.  There are limitations to data transfer of the facial images over a network has processing restrictions.

Some suggestions to improve the limitations is to change how facial images are captured.  Technology is improving, and higher-definition cameras and videos are available.  Additionally, computer networks are more secure and can process more data faster. Facial recognition biometric algorithms will be better able to pick out faces from an image and recognize profiles faster with more validity.

Slide 5 – Fingerprint Identification

Some of the organizations that have incorporated fingerprint recognition and authentication are heavily secured labs and facilities that require access control; immigration and international facilities; and laptops and other electronic devices with sensitive data and information.  Fingerprint biometrics are used to identify people and have three primary functions which include enrollment, search, and verifying.  Fingerprint scanning is efficient and accurate due to an almost perfect algorithm.  The advantages of implementing fingerprint scanners include fingerprints not being duplicated.  Another advantage is that fingerprints cannot be lost or stolen. Fingerprint biometrics only allow the detection of the individual’s information on a specific device.  No one would be able to provide another person’s fingerprint which is a highly secure.

There are several ways to detect fingerprints.  One method is correlation-based matching.  A couple of others include minutiae-based matching and the minutiae-based algorithm.  There is also a ridge feature-based matching.  Research shows that the most common is the minutiae-based matching algorithm due to the efficiency and accuracy.

The fingerprint scanning technology is rapidly replacing the current authentication methods such as photo ids, smart cards, passwords, and pins.  Those above can be lost or stolen where fingerprint scanning cannot.

Slide 6 Fingerprint Identification DISADVANTAGES

Although fingerprint scanning is efficient and secure, there are also some deficiencies.  Fingerprint biometric technology is probably the most well-known of the all the biometrics methods.  However, there is a possibility of distorted fingerprinting.  Fingerprinting distortion can occur if the individual’s fingers are not clean.  Therefore, the fingerprint reading or scanning may be rejected. When there is an ink fingerprinting, the twisting or rolling of the fingers in the ink sometimes causes a blur and the print will not be readable.  Deficient hygiene may also cause distorted fingerprint readings.   Additionally, fingerprint scanners are not able to distinguish between a real finger and a mold of a finger.  One other disadvantage is the when there is a case of stolen identity.  Data storage for fingerprints is costly but necessary.  The cost of the computer hardware and software is expensive.  The larger the database, the greater the possibility of duplications and errors. One often overlooked issue is an employee punches in on the fingerprint scanner and the system mistakenly thinks it’s the person behind.  This can lead to unauthorized access and entry which is a security violation. In the retail industry, a fingerprint scanner could accidently read an employees’ fingerprint for someone else’s. This is rare but is possible if there is a malfunction in the system.

Slide 7 – HAND GEOMETRY BIOMETRICS ADVANTAGES

Hand Geometry Biometrics is defined by the geometric shape of the hand.  It is simple to use and the data is easier to collect.  It has been described as less intrusive that regular fingerprinting and environmental factor are not an issue.   However, this biometric authentication is not unique and is not ideal for identification systems.  The data size of hand geometry is huge, and data storage capacity for most organizations will probably need to be increased.  Although this system is easy to use and less expensive than the others, there are some limitations.  However, it is easy to collect this data.   Again, this method is easy to use and is less expensive.  The data collection for this method is easy and factors such as whether or not a person has arthritis or clean hands is not an issue.   Hand Geometry Biometrics is also less intrusive than regular fingerprinting and the iris scans and retinal scans.  There are many benefits to the hand geometry biometrics, and this method should probably be considered to be blended with some other form of biometrics.

Slide 8 – HAND GEOMETRY BIOMETRICS DISADVANTAGES

The biometric hand geometry method uses the shape of the hands for identification.  Hand geometry system readers uses the hand measurements stored in a database and compares it to the user’s hand.  The storage of hand dimensions and measurements can be costly. Viable hand geometry devices have been manufactured since the early 1980s, making hand geometry the first biometric to find widespread computerized use. Hand Geometry Biometric is popular; and several organizations use this method for access control and time-and-attendance operations.

Hand Geometry Biometrics is not unique and cannot be used in identification systems.  It is not ideal for growing children.  Any rings or jewelry should be removed when using this method to get a clean reading of the hand. The size of the data of hand geometry biometrics is large.  It is not ideal for using it in embedded systems.  Therefore, in large populations, hand geometry is not suitable.

Slide 15 – Conclusion

This powerpoint presentation provided a definition of biometrics and discussed several of the different methods currently being used.  This powerpoint presentation informed that the fingerprinting biometric verification is the oldest method and that eye recognition although more accurate it is also the more expensive form of biometric authentication — Iris and Retina scans.

Additionally, this presentation informed of some of the newer forms of biometric solutions such as the heart rate, butt recognition which are currently being researched and in development.

The Information Security Departments should be aware of the advantages and disadvantages associated with each of the different biometric methods.  And, perhaps the approach to biometric authentication should be to include blended solutions.  Blended solutions would implore increased security since organizations are required to implement reliable ways that continuously determine user credentials and authentication to keep the hackers and crackers at bay.   Biometric Identification and Authorization should provide secure access but also maintain flexibility and ease of use.  (Yang, Yingzi Du, & Zhou, (2011) Proposed in their research a newer concept of consent biometrics (Yang, Yingzi Du, & Zhou, (2011).   (Yang, Yingzi Du, & Zhou, (2011) Portend that consent signature which uses confirms user consent.  The user’s physiological and behavioral features can be extracted and used to enhance security (Yang, Yingzi Du, & Zhou, (2011).

Biometrics often offers secure access with minimal obstacles.  Biometrics can leverage security systems that have already been implemented without excessive costs and disruption to the existing systems.  Additionally,  Bhargav-Spantzel, (2014) state that biometrics  represent an important class of identity attributes and biometric data should be used in combination with other access and identity methods such as passwords and cryptographic tokens Bhargav-Spantzel, (2014).  Existing information technology infrastructures such as legacy systems and applications along with cloud computing can be used to assist with implementing IT infrastructure, including legacy and cloud-based applications.

 

 

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Implementing authentication biometrics as an additional security measure. Available from:<https://www.essaysauce.com/information-technology-essays/2016-11-29-1480442089/> [Accessed 11-04-26].

These Information technology essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.