laptop security using biometric measures

Post on 08-Apr-2018

223 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 1/17

Laptop security using Biometric Measures

Improved management of user passwords

Digital signing of transactions

Secure PCs and laptops

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 2/17

Leaking information

y Stealing millions of data from veteran·s laptop(2/04)

y Confidential Data on laptop stolen from employee·s home(5/05)

y Veterans· company data

y Social Security numbers

y Bank account details

y CardSystems exposes data of 40 million cards (2006)

y

Data on 70,000 cards downloaded from ftp serverThese are attacks on privacy (confidentiality, anonymity)

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 3/17

Passwords Are Not Enough!

� Passwords are easily changed

� Passwords are difficult for people to manage

� Passwords are easily cracked

Can we rely on passwords to protect our valuabledigital data and communications?

Source: Janney Montgomery Scott, ́ Solving the World·s Identity 

Crisis,µ November 2005

´With identity theft running cases, corporate dataand networks are being adjusted everyday,

authentication and identity managementsolutions have become a ´must haveµ

technology for all those storing, accessing, anddisseminating sensitive data³includinggovernments, enterprises, and online consumers.µ

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 4/17

Strong Authentication

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 5/17

What Is Strong Authentication?

What you know What you have

Strong authentication means using two or more

authentication methods

What you are

Authentication ² the three what·s

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 6/17

Biometrics - A usefulness to

laptops

Leading Laptops

73% have Swipe Sensors

[TravelMate 740 by Compaq und Acer]

Biometrics???

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 7/17

Biometrics

Authentication using human identifying factors� Fingerprints

� Well accepted methodology� Long-used in law enforcement

� Hand prints� More complete picture than fingerprint

� Retina patterns� Unique but difficult and invasive� Requires a powerful scan

� Iris patterns� Not so unique (but somewhat so)

� Voice recognition� Can be fooled by recording someone·s voice

� Face recognition� Still difficult today and requires human intervention

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 8/17

Fingerprints ² A Deeper Study

� To understand the ease of biometrics, we will studyfingerprint authentication in greater detail

� Fingerprint authentication is secure if we can besure that there is a person standing behind thefingerprint

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 9/17

Fingerprint Recognition:

Sensors (II)

Thermal sensor[FingerChip� by ATMEL

(was: Thomson CSF)]

E-Field Sensor[FingerLoc� by Authentec]

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 10/17

The program captures theThe program captures thefingerprint and then«..fingerprint and then«..

Loop patternLoop pattern

Whorl patternWhorl pattern

Arch patternArch pattern

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 11/17

«.converts the image of a fingerprint«.converts the image of a fingerprint

into digital minutiae that contains data.into digital minutiae that contains data.

The minutiae is then stored for comparison.

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 12/17

Minutiae comprise the basis for matching.Minutiae comprise the basis for matching.

The fingerprint is not stored or saved.

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 13/17

User is confirmed and identifiedUser is confirmed and identified

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 14/17

Biometric measures - Proves to be

beneficial

y Keys and passwords only seems to be beneficial which areactually not.

y Keys, passwords etc can be stolen, copied, lost, forgotten ² fingerprints, eyes cannot.

y Biometric ID ensures that a person requesting access is actuallythe person who was granted access

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 15/17

Usefulness of biometric measures

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 16/17

One-Time Passwords ² Security Factors

� Less number of attacks± Stealing one-time passwords is not an easy task (need

access to device) and provides very limited damage

Multiple factors of authentication± Yes (can require PIN as well as one-time password)

� Protection from phishing attacks

± No direct login, but if it does then damage is limitedto a single access

8/7/2019 Laptop security using biometric measures

http://slidepdf.com/reader/full/laptop-security-using-biometric-measures 17/17

Thank you

top related