StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Biometric Authentication - Essay Example

Cite this document
Summary
Biometric Authentication is generally a more secure means of optimizing data security on online transaction as it minimizes the risk of impersonation and identity theft. In essence, biometric identification implies that the owners of the information are present in person as it…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Biometric Authentication
Read Text Preview

Extract of sample "Biometric Authentication"

Evaluation of the Viability of Biometric Authentication For Online Transactions Presented By: Computer Sciences and Information TechnologyLecturer’s NameInstitution’s NameLocationDate1. Viability of biometric authentication methods for online transactionsBiometric Authentication is generally a more secure means of optimizing data security on online transaction as it minimizes the risk of impersonation and identity theft. In essence, biometric identification implies that the owners of the information are present in person as it identifies unique features such as eyesight, fingerprint, and voice data (Oezcan 2003, p. 11). Unlike password and signatures which are easily stolen by third parties, biometric authentication relies on the actual data from the actual users, leaving minimal chances.

Biometric methods are more reliable than other methods, but still faces various limitations and exposure to dynamic attacks.. The desirable processes of biometric authentication methods that make it reliable include verification, screening and identification.1.1. VerificationThis is a test make sure that a person A is exactly the one he claims to be. The verification can be envisaged in two ways: using central storage or using distributed storage.1.2. ScreeningThis process makes use of a watch list or a database, containing data of people to be excluded.

It has records containing only the biometric information for specific individual (Ratha, Connell & Bolle 2001, p. 610). Every individual provides biometric samples to be checked to confirm if it matches the watch-list.1.3. IdentificationThis process is used in the discovery of an individual without the user’s prior claim of identity. It checks the bio information against the contents of a central database without which it cannot operate. 2. Increased Potential ViolenceIn spite of the great success in biometric authentication, online transactions face exposure to possible attack such as risks of Man-in-the-Middle attack and bio phishing.2.1.

Man-In-the-Middle AttackThis is the attack where a person pretends to be a genuine person or individual service provider and prompts a user to provide personal bio data. Once the data is available and has passed through verification, the perpetrator of the attack performs unauthorized transactions.2.2. Bio PhishingThe phishing attack is equally harmful and takes place with or without the knowledge of the owner of the bio data. For example, an individual gets into a banking hall, gets into a dust bin and collects half-filled customer vouchers containing handwritten signature or fingerprint.

He or she scans the signatures and finger prints which are then used electronically for valid online transactions.3. Success in Biometrics3.1. SecurityBiometric methods are more secure in the performance of online transactions. The owner provides Unique biometric information only when required electronically, unlike in the use of ordinary identification numbers. 3.2. PrivacyA biometric method provides a high degree of privacy to users and minimizes the exposure of information to unauthorized parties (Weaver 2006, p. 99). For example, for an iris scan to be done, a person must be physically available.4. Failures of Biometric Methods4.1. Frauds and ForgeriesIt is possible to fraudulently reproduce biometric data depending on the resources, modality, the application and availability bio-data being reproduced.

This can take place with or without the co-operation of the owners of the biometric data. Before deciding on whether the biometric system should be used or not, the first question is whether the biometric information can be technologically reproduced artificially. Secondly, it is necessary to check the availability of the data. The last question is whether it is possible to use biometric sensors for detecting possible impostors or not.4.2. Low Efficiency (90%)The efficiency of biometric data verification and authentication is only 90% (Jain, Hong & Pankanti 2000, p. 97). This means there is a 10% exposure to imposters, and risk of frauds.

Regardless of the successes in biometric methods, it is important to sensitize users against the possible attacks on online transactions.5. ConclusionBiometric methods are indeed security improvements for online identification and transactions. For the threats of attacks in biometric information on internet transactions require application of stronger security involving a combination of multiple authentication stages. For example, safety can be improved by combining hand written signature, thumb print and iris or retina scan.

In case a malicious attack perpetrator gains access to one of them, it is almost impossible that he or she will gain access to the other two, hence, the chances of attack are reduced. ReferencesOezcan, V 2003, ‘Germany Weighs Biometric Registration Options for Visa Applicants’, Humboldt University Berlin, p.11.Weaver, AC 2006, Biometric Authentication, Computer, 39 (2), p. 99.Jain, A., Hong, L & Pankanti, S 2000, ‘Biometric Identification’. Communications of the ACM, 43(2), p. 97.Ratha, NK.

, Connell, JH and Bolle, RM 2001, ‘Enhancing security and privacy in biometrics-based authentication systems’, IBM systems Journal, vol. 40, pp. 610–631.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Biometric Authentication Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1676562-biometric-authentication
(Biometric Authentication Essay Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1676562-biometric-authentication.
“Biometric Authentication Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1676562-biometric-authentication.
  • Cited: 0 times

CHECK THESE SAMPLES OF Biometric Authentication

The Primary Goal of the Military

These features are unique to individuals and readily available; hence, making them ideal for the development of dependable authentication systems.... Since it would be hard to develop systems that cater for individual staff, DoD can come up with an authentication system based on the roles people play.... Insensitive matters of national or international security, DoD could develop authentication systems without considering costs and returns on investment (Ballad, Ballad, & Banks, 2010)....
8 Pages (2000 words) Essay

Biometric Technology for Singapore: An Analysis

Singapore too has planned to embrace biometric technology in a big way with some pioneering measures and some hesitant ones.... This study aims to analyse the relevance of using biometric technologies in Singapore to collect, store and use this biometric information and personal particulars of its local residents and foreigners for security and other purposes.... While verification involves "one-to-one" matching to determine whether there is a match between the person's presented biometric and biometric templates in a database, identification involves "one-to-many" matching where available biometric is compared with a database to establish identity of a person....
10 Pages (2500 words) Essay

1.What is a false reject rate What is a false accept rate How are they related to the crossover error rate

It is the degree of probability that the biometric system will incorrectly reject the False Reject Rate False Reject Rate Biometrics, also referred to as Biometric Authentication, is the study through which human identity is recognized by its traits and characteristics.... There are various types of biometric identification.... It is the degree of probability that the biometric system will incorrectly reject the access of an authorized person....
1 Pages (250 words) Essay

Safety of Biometric Authentication

The paper "Safety of Biometric Authentication" explains Biometric Authentication ensures individual and state safety by restricting access to security details to key people.... This kind of authentication is what is referred to as Biometric Authentication.... Ministries of defense in various developed countries have therefore employed Biometric Authentication in their military bases to restrict access to only authorized people and not just anyone....
7 Pages (1750 words) Essay

Biometric Authentication Systems

The paper "Biometric Authentication Systems" tells about new technologies that are highly accurate, reliable, and not intrusive to the users.... hellip; Systems and applications that require an authentication include computer systems, gaining access to buildings, personal computers, laptops, cellular phones, and ATMs.... biometric systems whether chemical, visual, or behavioral offer reliability in user identification and minimizes time wastages....
10 Pages (2500 words) Essay

Health Information Confidentiality

In addition, Biometric Authentication tools could be adopted in the verification and authorization of individuals using portable devices such as mobile phones.... In addition, the devices lack authentication, thus allowing for accessibility of the information by any individual.... easures against HIPAA violations involve performing periodic assessments of the risks involved in mobile device use and ascertaining the presence of proper encryption, authentication, and physical protections that safeguard PHI....
2 Pages (500 words) Assignment

Biometric Technology in Singapore

This coursework called "biometric Technology in Singapore" describes the relevance of using biometric technologies in Singapore to collect, store and use this biometric information and personal particulars of its local residents and foreigners for security and other purposes.... ingapore too has planned to embrace biometric technology in a big way with some pioneering measures and some hesitant ones.... his study aims to analyze the relevance of using biometric technologies in Singapore to collect, store, and use this biometric information and personal particulars of its local residents and foreigners for security and other purposes....
8 Pages (2000 words) Coursework

An Access Control System Trends and Future Directions

This report "An Access Control System Trends and Future Directions" presents Access Control Systems Technology as rapidly advancing and becoming more integrated hence proving users with more advanced functionalities that aid in the realization of ACS success.... hellip; Smartphones nowadays can perform functions similar to those of card readers and servers....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us