Article guidelines (Important):

weepingwaterpickSecurity

Feb 23, 2014 (3 years and 6 months ago)

183 views

Article guidelines

(Important):




Make sure that you use your own creativity in writing the article as the research
provided is just a guideline for you to frame the article.






Make sure to include all the sub
-
headers given in the research notes as they
are
important part of the article format.




Include top image relevant to the topic of 250
/550

width

(whichever mentioned in the
research notes)





Resize the images
/screenshots

provided under each utility
/

to 550
/450

width

(whichever mentioned in the resear
ch notes)

and include in the article.




Include relevant tags for the story.




Make doubly sure to include the links and images in the story provided at the relevant
places in the article text.




In case the article is written referring to a single blog only

then make sure to give the
credit by providing the inline text link in the beginning paragraph or giving Via: [Followed
by the blog/website from where the article is written] and linking the URL.



Storyline:


1.

What is it?

2.

Existing biometric technologies

3.

Advantages of Biometrics

4.

Biometri
c technology that can be hacked

________________________________________________________________________

Research notes:
-



Article header:
Biometric technologies


are they safe?


Asset:
Top

image

(resize to 250 width and upload)


Image Link:

1.

http://news.bbc.co.uk/nol/shared/spl/hi/guides/456900/456993/img/1161854869.jpg

Or

2.

http://www.pinewswire.net/wp
-
content/uploads/2010/03/iStock_000010436537XSmall.jpg


Image Source Link:



#
Biometrics technology overview




Biometrics consists of methods for uniquely recognizing humans based upon one or more
intrinsic physical or behavioral traits.
In computer science, in particular, biometrics is used
as a form of identity access management and access control. It is also use
d to identify
individuals in groups that are under surveillance.



Biometrics has fast emerged as a promising technology for authentication and has already
found place in most hi
-
tech security areas.



It is becoming widely used within the government, nuclear

power plants, hospitals, airports,
the workplace, and even schools. Its use is controversial but its benefits are undeniable.
Biometrics helps protect sensitive data, ensure login identity, and prevent criminal activity.

It is this specific aspect of the
technology that we would like to focus on.





#
Existing biometric technologies


Biometric characteristics can be divided in two main classes:


1.

Physiological are related to the shape of the body. Examples include, but are not limited to
fingerprint, face
recognition, DNA, Palm print, hand geometry, iris recognition, which has
largely replaced retina, and odour/scent.

2.

Behavioral are related to the behavior of a person. Examples include, but are not limited to
typing rhythm, gait, and voice. Some researchers
[1] have coined the term behaviometrics
for this class of biometrics.



#
Advantages of Biometrics




Increase security
-

Provide a convenient and low
-
cost additional tier of security.



Reduce fraud by employing hard
-
to
-
forge technologies and materials. For
e.g.

Minimiz
e the
opportunity for

ID fraud, buddy
punching.



Eliminate problems caused by lost IDs or forgotten passwords by using physiological
attributes. For e.g. Prevent
unauthorized

use of lost, stolen or "borrowed" ID cards.



Reduce password administration costs.



Replace hard
-
to
-
remember passwords which may be shared or observed.



Integrate a wide range of biometric solutions and technologies, customer applications and
databases into a robust and




scalable control solution
for facility and network access



Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!



Offer significant cost savings or increasing ROI in areas such as Loss Prevention or Time &
Attendance.



Unequivocally link an individual to a transact
ion or event.



#
Biometric technology that can
be
hacked


We know that
F
ingerprint
recognition

is widely in

use in

these days

and also used by the many
common electronic gadgets like;
laptop, mobile phones and guns also. The next popular
biometric technology is
F
ace
recognition
, but main problem with these that they are not as
reliable as we think so, they can be hacked

easily
.


1.

Fingerprint recognition hack:


Today biometric systems ar
e becoming mainstream. They can be found everywhere. In mobile
phones, computers, entrance systems even in ATMs. Because of the low costs, small sizes and the
alleged maturity mostly fingerprint sensors are used.

But contrary to the assurance of the
manufa
cturers they are still very easy to hack.

Here are the videos that shows, how easily it can be
hack by anyone.




Video Link:

http://www.youtube.com/watch?v=WEjkts7Fn3I


http://www.youtube.com/watch?v=
-
H71tyMupqk&feature=related

(embed the video code
in 550 width)


2.

Face recognition hack:


Face recognition system scans the face of the person and use its captured image as his
password for the next time.
Face recognition systems are also widely in use. But this system
is not safe to use it as password.
The researchers cracked the biometric aut
hentication
embedded in Lenovo, Asus, and Toshiba laptops by spoofing the biometric systems with everything
from a photo of the authorized user to brute
-
force hacking using fake facial images.

Here is the
video that demonstrates that how easy it is to hac
k with the use of the sca
n
ned image, photograp
h
and other electronic devices
like mobile phone

and other which can take photo as well display it on
the device
.


Video Link:

http://www.youtube.com/watch?v=u0Wouis7PuY

(embed the video code in 550 width)



3.

V
oice recognition hack:

It is very easy

and simple

to hack by anyone
, as one can record other person’s

voice (pitch)
using voice recording devi
c
es and play it at the same volu
me
.


#
Biometric technologies

that are safe till the day



1.

I
ris & retinal
(eye)
scans

or recognition




Iris recognition technology is used to identify individuals by photographing the iris of their
eye. It falls under a category of technology known as
biometric
-
based authentication, also
called biometric security. Iris recognition technology has become popular in security
applications because of its ease of use, accuracy, and safety. Its most common use is
controlling access to high
-
security areas.



Iris

recognition technology offers the highest accuracy in identifying individuals of any
method available. This is because no two irises are alike
-

not between identical twins, or
even between the left and right eye of the same person. Irises are also stable
; unlike other
identifying characteristics that can change with age, the pattern of one's iris is fully formed
by ten months of age and remains the same for the duration of their lifetime. Iris
recognition technology is also accurate because it uses more t
han 240 points of reference in
an iris pattern as a basis for a match. By comparison, fingerprints use about 60.




2.


DNA Identification System




The DNA

(Deoxyribonucleic acid)

Identification System does have its benefits, as it would
help in the medical department. If you were rushed to hospital from a car accident and you
are unconscious the doctor will know if you were allergic to the anaesthetic or if you were a
private pati
ent or not. This would also help in the crime department
.



DNA identification can be quite effective if used intelligently. Portions of the DNA sequence
that vary the most among humans must be used; also, portions must be large enough to
overcome the fact t
hat human mating is not absolutely random.



From Paul Saffo, "DNA is the gold standard of biometrics, but even DNA starts to look like
fool's gold under close inspection. With a bit of discipline, one can keep a card safe or a PIN
secret, but if your DNA be
comes your identity, you are sharing your secret with the world
every time you sneeze or touch something."