Title: New Security Approaches
1New Security Approaches
- Biometric Technologies are Coming of Age
2Traditional Security Approaches
- Human guards
- Police
- Locks and keys
- Numeric keypads
- Magnetic cards/PINs
- Usernames/passwords
- Surveillance cameras
Source www.zonezero.com
3What is wrong with traditional security
approaches?
- Human guards, police are expensive, prone to
error and corruption - Keys, PINs, passwords can be stolen, lost, or
cracked - PIN identifies a card and password identifies a
username, not user
Source www.cityofcody.com
4Definition of Biometrics
- Computerized methods of instantly recognizing
people based on unique physical or behavioral
characteristics
Source www.banking.com
5Tasks of Biometric Technologies Identification
- Captures a persons biometric information and
looks for a match - Answers question Who are you?
- Answers question Are you the one we are looking
for?
Source www.time.com
6Tasks of Biometric Technologies Authentication
- Prompts a person to identify herself (e.g. insert
card or type username) - Captures the persons biometric information and
verifies if she is who she claims to be
Source www.digitalpersona.com
7Types of Biometrics
- Face recognition
- Iris scanning
- Retina scanning
- Fingerprinting
- Hand geometry
- Voice recognition
- Signature verification
- Keystroke dynamics
Source www.hsme.memphis.edu
8Types of Biometrics
Source www.adobe.com
9Types of Biometrics
Source www.cnn.com
10Recognized After 17 Years
- The Afghan woman, Sharbat Gula, was photographed
17 years ago in a refugee camp in Pakistan. She
was found by the original phographer in the
beginning of 2002. Her identity was confirmed by
iris analysis.
11Types of Biometrics
Source www.cnn.com
12Types of Biometrics
Source http//it.mycareer.com.au
13Types of Biometrics
Source www.eggington.net
14Types of Biometrics
Source http//biometrics.cse.msu.edu
15Types of Biometrics
Source www.state.tn.us
16Types of Biometrics
Source website.lineone.net
17Biometrics Comparison
18Applications of Biometrics Identification
- Search and apprehension of criminals and suspects
- Counterterrorism
- Identification of visitors
- Shopping mall security
- Identification of shoppers
Source www. access-control-systems.org
19Applications of Biometrics Authentication
- Physical access control
- Time and attendance
- Benefit payment systems
- Border control systems
- PC/Network access control
- Internet verification for e-commerce and home
workers - ATM applications
- National identity cards
Source www.qvoice.com
20Future Biometrics
Source www.ozspy.com.au
21Future Biometrics
Source www.skirsch.com
22Biometrics and Rising Privacy Concerns
- Big Brother
- Invasion of privacy
- Total surveillance
- Theft of biometric data
- Lack of effective privacy legislation
Sourcewww.promax-uk.org
23When will biometric technologies by available?
- Available now from a number of vendors
- Fingerprinting devices sell for around 100
- Iris scanning devices start at around 300
- Face recognition systems start at around 15,000
- Prices expected to continue falling by as much as
50 by 2005
Source www.siemens.com
24How can my organization become involved in
biometric technologies?
- Physical access restrictions
- Computer networks and remote access issues
- Time and attendance issues
- Individual customers or online business partners
- Security procedures for online payments
- Currently used technologies
25Who is involved with biometrics locally?
- Washington Mutual (formerly Bank United)
experimented with Eye-TMs iris scanning of
ATM customers - Kroger and HEB installed fingerprinting for time
and attendance monitoring - NASA experiments with using biometrics to allow
engineers to control space flights from home
computers - Compaq offers several fingerprinting devices
Source www.viisage.com
26- Your questions are welcome!