Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
Biometric Security Technology
Transcript of Biometric Security Technology
By Max Berry
What does 'Biometric' mean?
"The identification of humans by their anatomical characteristics or traits”
How are biometrics used within the computing industry?
Comparing evidence from a crime scene with previously or subsequently recorded biometric data
Examples: fingerprint, DNA
for computer, network, and physical access and rights management
Example: log on to PCs by fingerprint
Comfort & Personalisation
Identifying a person and changing personal settings accordingly
For example, setting the seat, mirrors, etc. in a multi-user car by facial recognition
What Biometric characteristics are able to be used in security technology?
How are our biometrics determined?
Heavily determined by genes from parents
Random genetic variation
Determined by upbringing and social environments
Can be highly susceptible to change
Unique but can fool biometric systems in the cases of identical twins and some siblings
Biometric security model vs Conventional
Verification vs Identification
Is that you *username* ?
Who is this? Do I recognise you?
Conventional security authentication methods tend to be based around two models:
Something the user “has” – e.g. Key, electromagnetic card, electronic fob etc.
Something the user “knows” – e.g. Pin number, password, combination etc.
Biometric validation uses a third model:
Something that you “are” – e.g. Human characteristics such as face, voice, DNA, etc.
That’s all great, but why is no one doing anything with this technology?!
PIPA Touch informational video
Never be a 100% fool proof system
Advantages out weigh disadvantages
More secure than passwords
Could drastically impact the way we interact with our devices
Would you use a biometric security technology?
Data needs to be stored securely
Systems and hardware can be costly
Still able to be compromised
Will need secondary, conventional back up security feature implemented
Not fool proof – limitations in certain biometric traits
More accurate than conventional passwords
Greater combination possibility
Unique to the user
Harder to crack
Advantages & Disadvantages of using Biometric security technology