Biometrics are like passwords, but worse.
Biometrics are like passwords that you leave everywhere (fingerprints, facial recognition, voice patterns), except that unlike passwords, you can’t change them when they’re lost or stolen. It’s easy to change your password, a bit harder to get a new retina. Like passwords, risk goes up as they are stored globally (in the cloud) versus locally (on a physical device).
In addition to the biometrics mentioned above that most of us have come to accept as commonplace, there are many other methods in use or under exploration:
- hand geometry
- vascular pattern recognition (analyzing vein patterns)
- iris scans
- DNA
- signature geometry (not just the look of the signature, but the pen pressure, signature speed, etc.)
- gait analysis
- heartbeat signatures
Posted in Cyber Data Security by Identity Theft Speaker John Sileo.
Tags: "What are biometrics", Biometric, Biometric Scans, Biometric Security, Biometrics, Define Biometrics, identity theft expert, John Sileo, Security, Sileo
Identity Theft is a huge and growing problem. According to the recent 2009 Identity Theft Fraud report by Javelin Strategy & Research, victims increased 22% in 2008 to 9.9 million. When businesses are involved, the companies face billions of dollars in theft, millions of dollars in fines and, perhaps most important, the loss of customer trust.
The large impact that identity theft has on individuals lives and corporations’ bottom lines has made inexpensive biometrics look attractive for authenticating employees, customers, citizens, students and any other people we want to recognize. The most recent debate is on whether the pros outweigh the cons. (To see some of the materials that influenced this article, please visit George Tillmann’s excellent article in Computerworld).
Biometrics uses physical characteristics, such as fingerprints, DNA, or retinal patterns to positively verify individuals. These biological identifiers are electronically converted to a string of ones and zeros and stored on file in the authenticator database.
Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker John Sileo.
Tags: "Identity Theft, Authentication, Biometric, Biometric Identity Theft, Biometric Security Risks, Biometrics, Business Identity Theft, Finger Prints, John Sileo, Retinal Scan, Verification