Preview

Biometrics and Network Security

Better Essays
Open Document
Open Document
1656 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometrics and Network Security
Biometrics and Network Security

Abstract
Biometrics are a growing technology that will most likely be seen applied to network security in the near future. Three options are discussed in this paper; keystroke dynamics, fingerprinting, and iris scanning. Each option has its strengths and weaknesses but none of them are a standalone solution to access a network. Should any of these solutions be applied they would need to be combined with password or token security measures that are currently in place.
Keywords: biometrics, keystroke dynamics, fingerprint, iris scan

Biometrics and Information Technology
This paper will discuss current and future biometrics capabilities and how those capabilities may be applied to information technology (IT) security, most importantly how the U.S. military can incorporate biometrics into its network security framework. Almost all major corporations as well as the U.S. government are looking to, or have already incorporated biometrics into their layered IT security.
Biometrics, coupled with passwords and tokens can significantly increase network security, however, biometrics alone at their current capabilities are more susceptible to security breaches than passwords alone.
Background
CNN recently reported that there are over 60,000 cyber-attacks occurring every day on military networks and effective security measures are continually being sought to protect information from those that could use it to do the nation harm. In the past 8 years the military has incrementally increased user level security measures to protect this vital information. In 2003 a military computer user could simply log on to the network using a relatively short password associated with their user name. As security concerns began to increase those password length and symbol requirements became more stringent. Now the military exclusively utilizes a token system to access military networks in the form of a common access card (CAC) with smart chip



References: Douhou, S., & Magnus, J. R. (2010). The reliability of user authentication through keystroke dynamics. Statistica Neerlandica, Nov2009, Vol. 63 Issue 4. Retrieved from EBSCOHOST 365 Computer Security Training. (2010). What is Biometric Fingerprint Scanning. Retrieved from http://www.computer-network-security-training.com/what-is-biometric-fingerprint-scanning/ Daily Mail. (2011). Log-in to Facebook with an iris scan: Eye-scanner for your PC set to go on the market in months. Retrieved from http://www.dailymail.co.uk/sciencetech/article-1385959/Under-look-key-PC-iris-scanner-security-device-set-market-months.html

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Good Essays

    IAFIS is the largest biometric database in the world. This system houses on average more than 70 million criminal files of subject along and around 34 million if not more civil prints. This system has more than 73,000 known terrorist that are suspected terrorist crimes against the United States. ("The fbi: Federal,2008”).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The authentication process is a necessity for safeguarding systems against various forms of security threats, such as password-cracking tools, brute-force or wordbook attacks, abuse of system access rights, impersonation of attested users, and last but not least reply attacks just to name a few. In addition, it is imperative that authentication policies are interchangeable with the organizations in which information is being exchanged if resources are being shared between alternative organizations.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Home and occupational users alike are using biometric security. Through a biometric element, such as a fingerprint, devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    • Biometrics – Considered the most secure way to authenticate users, biometrics utilizes the biological factors of a user. Examples include retinal eye scan and fingerprints.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Biometric systems are technologies that can scan physiological, chemical or behavioral characteristics of a subject for the sake of verifying or in other words authenticating their identity. It is the latest weapon in the fight against computer crime and identity theft. These technologies work with the help of sampling distinctive biological features, such as tracing patterns of blood vessels in the retina, voice recognition or fingerprinting. Later biological features are extracted and then converted into mathematical codes which are then stored as a biometric template. In order to confirm the identity of the user, they will be required to interact with the system scanner which will process the users identitywith the help of an iris or fingerprint scan. This sample is then compared with the template for a positive match and therefore, access is either granted or denied accordingly.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and which new hairstyles (Allensmith, n.d.).…

    • 325 Words
    • 2 Pages
    Good Essays
  • Good Essays

    a distributed system, various resources are distributed in the form of network services provided and managed by servers. Remote authentication is the most commonly used method to determine the identity of a remote client. In general, there are three authentication factors: Something the client knows: password. Something the client has: smart card. Something the client is: biometric characteristics (e.g., fingerprint, voiceprint, and iris scan). Most early authentication mechanisms are solely based on password. While such protocols are relatively easy to implement, passwords (and human generated passwords in particular) have many vulnerabilities. As an example, human generated and memorable passwords are usually short strings of characters and…

    • 6790 Words
    • 28 Pages
    Good Essays