Monday, July 4, 2022
Techiexpert.com
No Result
View All Result
  • Login
  • Register
Exclusive Videos
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media
No Result
View All Result
TechiExpert
No Result
View All Result

Passwords vs Biometrics: Which one provides more security? Analysis By Francisco D’Agostino

Sony T by Sony T
March 1, 2021
in Tech news
Reading Time: 5 mins read
Passwords vs Biometrics: Which one provides more security? Analysis By Francisco D’Agostino
13
SHARES
138
VIEWS
Share on FacebookShare on Twitter

Today we are going to talk about a super trendy way of identification. New ways to increase security in companies is being created and this one has been around for a while, but we want to study how safe it actually is. We are talking about biometric identification systems. How does it work? How can it be improved? Which are the flaws? Francisco D’Agostino explains all about it so keep reading to learn more about this topic.

First, let’s define what biometric identification is. According to the National Security Cyber Centre, “Biometrics work in a slightly different way to something like a PIN or password. In these cases, an access control system will compare a stored password with the one entered by an individual. If they are identical, access will be granted.”

So, when talking about the term “biometrics”, the NCSC explains that “The ISO and IEC standards bodies have defined biometrics as, ‘the automated recognition of individuals based on their biological and behavioral characteristics.”

Now the trendy part is that a lot of companies are using either facial recognition or fingerprint recognition in order to increase their security. However, the question remains… is this system 100% sure?

Well, the answer is no. One of the reasons for this is that no two captures of biometric data will produce truly identical results. So, how do they actually work? Well, a biometric system must make an estimation as to whether two biometric samples come from the same individual.

Estimations can take time and we have to make a decision in terms of how fast we want this estimation to happen and more important, how accurate it needs to be. If we want comparisons to happen fast, then we must accept that more comparisons can be incorrect and this will have an impact in security breaches.

And this is one of the main differences that this system has in comparison to passwords. Passwords are not estimating anything. In fact, if the password doesn’t have an exact match, then it doesn’t grant access and this is an important aspect in pro of passwords.

Biometrics and attacks

Biometrics might look pretty safe, but as everything, it can be the subject of attacks from malicious criminals. Let’s see how biometrics can suffer attacks.

First of all are presentation attacks. In this case, a person that is not in the system will try to mimic one that is and since these systems are estimating results, then there is a high probability that this can happen to your company. In order to avoid this, one way is to make sure that you don’t compromise yourself by asking for fast recognition instead of an accurate one. Having accurate results no matter how much time it takes is safer.

The second type is by intercepting data. This one is a bit more technical and harder to prevent, however, is a possibility that needs to be discussed. An attacker may seek to modify or intercept the data output from the sensor. A previously captured sample might be replayed, or a captured biometric sample could be substituted with biometric data of a different individual at enrolment.

In the same line of intercepting data, there is another option in which the attacker may target data during transmission, or in storage by the biometric system. This means that a biometric reference in the enrolment database could be modified to include the biometric features of an impostor.

There is also the traditional IT attack, in which the attacker targets the software used to implement the biometrics. These are usually made when the company holds high-value items or information that can be hijacked. The answer to protect yourself from this one is to rely on traditional IT security methods which are not specific to biometric systems. Also, having an IT team ready to handle any attempts to breach security is vital to protect your assets.

Types of biometrics recognitions

There are several types of biometrics recognitions available. Some of these are:

  • Fingerprint recognition
  • Speaker recognition
  • Iris recognition
  • Vein pattern recognition
  • Face recognition

Choosing the one that adjusts to your needs is vital to make sure you get the level of security that you desire to implement in your company and this should be done with the help of a professional team that helps you determine your needs and levels of security.

Passwords vs Biometrics

Now the main difference between passwords and biometrics is basically the human error. By having people setting up their own password, these can be really weak or they can be recycled from other sites. This represents a breach of security since it can easily be hacked.

However, as we explained above, biometric systems are not 100% sure and this has also an influence in the security standards of any company.

So, this leaves us the question… What is best? Passwords or biometrics?

Reality is that this depends entirely on your company’s needs. Depending on your necessity of security, you can rely on biometrics with a high-tech team that allows you to make it as bullet proof as possible.

But, if your needs for security aren’t that high and you can set up some conditions in terms of password settings, then continuing with secure passwords might be your way to go.

If you feel biometrics makes you feel secure just for being a trendy tech that several companies are using, we highly recommend you to study security breaches related to it first.

Remember that before choosing a biometric you should be aware of the likely threats and risks associated with its use and determine how these fits with your organization’s management of risk.

Francisco D’Agostino concludes explaining that just because there is a trendy technology that appears to be top security, it doesn’t mean that it actually is and this is very important in terms of studying your needs and your vulnerabilities before going for a new security system that can do more harm than actually helping in security.

Tags: biometricTech Trends
Share4Tweet3Share1Pin4

Related Posts

Telemedicine Business
Tech news

Telemedicine or e-medicine: What is it?

Ways Data Analysis has changed customer reward programs
Tech news

Ways Data Analysis has changed customer reward programs

Digital Learning face recognition
Tech news

Here’s why Deep Learning might not be enough for celebrity face recognition

VPS Helps Forex Trading
Tech news

Staying Safe When Trading on a Trading App

Mozilla launches Thinderbird for android
Tech news

Mozilla launches Thinderbird for android

Most Read

  • How to Track Someone’s iPhone by Phone Number?

    How to Track Someone’s iPhone by Phone Number?

    503 shares
    Share 201 Tweet 126
  • Top 5 car automation trends to know

    274 shares
    Share 110 Tweet 69
  • Is Parody Coin investment a Good Investment?

    101 shares
    Share 40 Tweet 25
  • What is windows modules installer ? How to Enable/Disable

    1246 shares
    Share 498 Tweet 312
  • Tips to Reduce Your Website Hosting Costs

    882 shares
    Share 352 Tweet 220
  • How to Track Activities an Instagram account?

    88 shares
    Share 35 Tweet 22

Recent Stories

Doing Cleanup: 5 Types of Links You Should Disavow

Backlinks
Share4Tweet3Share1Pin1

Hyperlocal marketplace Urvann raises Rs. 3 Cr in Seed Round led by IPV

Hyperlocal marketplace Urvann raises Rs. 3 Cr in Seed Round led by IPV
Share5Tweet3Share1Pin2

Does domain extensions impact SEO standards

Does domain extension impact SEO standards
Share5Tweet3Share1Pin2

How Enterprise Blockchain can enable Privacy Preservation

How Enterprise Blockchain can enable Privacy Preservation
Share5Tweet3Share1Pin1
  • Terms of use
  • Privacy Policy
  • About Us
  • Contact us
  • Write For Us
  • Cookie Policy

© 2022 All Rights Reserved

No Result
View All Result
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media

© 2022 All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Cookie Law Notice
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT