security implications of biometrics
DESCRIPTION
Colin Dougherty. Security Implications of Biometrics. What is it?. Oldest form of identification Unique identifiers…not secrets!. Examples of Biometrics. Physiological Face Fingerprint Iris and Retinal Hand Veins DNA Behavioral Voice Signature. Comparison of Biometrics. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/1.jpg)
Colin Dougherty
![Page 2: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/2.jpg)
What is it? Oldest form of identification Unique identifiers…not secrets!
![Page 3: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/3.jpg)
Examples of Biometrics Physiological
FaceFingerprintIris and RetinalHand VeinsDNA
BehavioralVoiceSignature
![Page 4: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/4.jpg)
Comparison of Biometrics Uniqueness Permanence Collectability Performance Circumvention
![Page 5: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/5.jpg)
Facial Recognition Primer Principal components analysis Viisage’s “EigenFaces”
![Page 6: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/6.jpg)
Real World Error Rates
False PositivesFalse Negatives
Airport BiometricsFace Recognition
![Page 7: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/7.jpg)
Fujistu’s Palm Vein Biometric Infrared Rays False Negative = 0.01% False Positive = 0.00008%
![Page 8: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/8.jpg)
Attacks and More Problems Verify accuracy and input correctly Replay Attacks Human Risk Poor Failure
Cancelable Biometrics
![Page 9: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/9.jpg)
MythBusters Defeat a Fingerprint Scanner
Copy of the fingerprint etched in latex.Ballistics gel copy of the fingerprint.Paper copy the fingerprint.
![Page 10: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/10.jpg)
Summary Security is in layers
Biometrics have strengths
Biometrics have weaknesses
Biometrics are unique identifiers not secrets!
![Page 11: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/11.jpg)
Sources Secrets & Lies, Digital Security in a
Networked World. Bruce Schneier. John Wiley & Sons, 2000
Jonathan Kent. BBC News, Kuala Lumpur: http://news.bbc.co.uk/2/hi/asia-pacific/4396831.stm
Worcester Polytechnic Institute. Viisage http://www.wpi.edu/News/Transformations/2002Spring/recognition.html
![Page 12: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/12.jpg)
Questions What are two ways of comparing
different Biometrics?
Fill in the blank: Biometrics are unique identifiers not ___________!
![Page 13: Security Implications of Biometrics](https://reader036.vdocuments.us/reader036/viewer/2022062323/56816335550346895dd3bfa2/html5/thumbnails/13.jpg)
Colin Dougherty