YOU ARE YOUR PASSWORD - BIO METRICS
General
1. Our digital world is being shaped by our physical bodies. Bio metrics are fast becoming the new way to identify ourselves. Security observers say that user IDs and passwords are obsolete and can be easily cracked, but that doesn't mean you should fire up bio metric authentication projects just yet. Because of the many password cracking techniques being used today in this modern world and the complexity necessary for passwords.
![]() |
FINGERPRINT |
Bio-metrics
2. The term bio metrics is derived from the Greek words bio meaning life and metric meaning to measure. Bio metrics may slowly get a foothold, but old fashioned passwords aren't fading away any time soon. Bio metrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals who are under surveillance. The basic premise of Bio metric Authentication is that every person can be accurately identified by his or her intrinsic physical or behavioral traits.
Recording of Bio metric Data
3. The recording of bio metric data is considered a multi factor authentication mechanism. In authentication, there are three factors such as something you know, as in a user ID and a password; something you have, such as a Smart Card or one time password or something you are, like in a physical characteristic.
![]() |
BIOMETRICS |
Bio metric Authentication
4. Bio metric authentication tools record a unique physical characteristic of the user, such as a fingerprint, iris scan or facial pattern. Typically the user will have a user ID and password in addition to a bio metric logon. But fingerprints can be spoofed, and images of them can be stolen, just like user IDs and passwords. The same can be said for a system based on facial recognition. A photograph of the user could be used to fake out the system, if the machinery is not properly configured.
Barriers to Bio metric Authentication
5. There are other barriers to the growth of bio metric authentication. First, it's difficult to compare systems equally, particular for analyzing costs and implementation in an enterprise architecture. A fingerprint reader, for example, is set up differently than a voice recognition system or an iris scanning machine. Bio metric technology is difficult to implement and requires a heavy investment in hardware and software, more so than simple password systems. Third, there is the question of customer acceptance and ease of use. Many people would be squeamish about looking into a beam that measures the iris.
![]() |
FINGER POINT |
Online Tools
6. Security observers say user IDs and passwords are obsolete and can be cracked with readily available online tools. But the same could be said about locks and keys for homes and offices. In some cases, a lock and key are adequate for some homes, just as the combination of a user ID and password is adequate protection for some computer systems.
Risk Level
7. The answer is in the level of risk. Before implementing any authentication system, a thorough Risk Assessment should be conducted to determine the business impact and costs of a data breach or malicious access. Bio metric authentication is only warranted for high risk systems where the cost of the breach would be greater than the cost of the system. If there is a system with large amounts of customer information or high value money transfers, then bio metric devices may be appropriate.
Types of Bio metrics
8. The two main types of bio metric identifiers depend on either physiological characteristics or behavioral characteristics. Physiological identifiers relate to the composition of the user being authenticated and incl facial recognition, fingerprints, vein recognition, voice recognition, retina scanning and DNA matching.
![]() |
BIUMETRICS |
Innovation
9. With bio metrics, you are the password. Bio metrics is emerging as the most cyber secure, convenient way for bank customers to authenticate their identities and access their accounts.
Bio metric Vulnerabilities
10. While high quality cameras and other sensors help enable the use of bio metrics, they can also enable attackers. Because people do not shield their faces, ears, hands, voice or gait, attacks are poss simply by capturing bio metric data from people without their consent or knowledge.
Components of Bio metric Devices
Bio-metric Data
11. Bio metric data may be held in a centralized database, although modern bio metric implementations often depend instead on gathering bio metric data locally and then cryptographic ally hashing it, so that authentication or identification can be accomplished without direct access to the bio metric data itself.
![]() |
BIOMETRICS |
Components
12. Components of bio metric devices incl:
a. A reader or scanning device to record the bio metric factor being authenticated.
b. Software to convert the scanned bio metric data into a standardized digital format and to compare match points of the observed data with stored data.
1. I intend to love making creative, interesting and learning videos. My channel/ facebook pages/ blogs stands out in terms of quality programming, makes an entertaining and profoundly moving case for creating an educational system. I continually search for light. I like to feel that my creation is a light that shines, illuminating the way; clarifying intricate issues, inspiring and motivating the hearts and minds of all human being. By watching my contents/ videos, you can learn the appropriate solution of integral life problems and family friendly entertainment.
2. I also like to put my active effort to give a deep insight and detail analysis on the famous speeches and interesting books of the world to enhance the knowledge as well as wisdom of every human being of the world. Let us all work together to teach each other so that we can fulfill our earnest desire to leave a better a planet for future generations.
3. I like to put a humble submission to all -- Please Subscribe, Like, Share and Comment on my contents that I create to help all who need. Be confirm, you won’t be disappointed.
4. PLEASE VISIT MY OFFICIAL WEBSITES AND CHANNELS IN THE URL APPENDED BELOW:
YouTube User ID: vk-X7m2r2Fxqwap3Io_V0A
YouTube Channel ID:
UCvk-X7m2r2Fxqwap3Io_V0A
5. It is most likely that my contents may consists of unintentional mistakes. I would kindly request you all to correct those to fit in with your needs/ requirements/ desires ---
I LOVE YOU ALL. YOU ARE AN INSPIRATION.
I look forward to staying in touch.
Almighty Allah Bless Us All.
Ameen.
All the best----
Warmly
Md Lutful Huda
![]() |
MD LUTFUL HUDA |
Comments