0% found this document useful (0 votes)
160 views13 pages

BiometricsinCybersecurity 1

The document discusses using brainwave signatures for authentication in cyber security. It notes that while other biometrics like fingerprints have increased security, hackers can still access systems. The document proposes that brainwave authentication could overcome issues by matching a user's psychological profile and revoking access if it no longer matches stored records. It describes how brainwaves are produced and how questions could generate unique signatures for authentication across devices. However, the technology is still in early stages and would require changes to computer architecture and fitting users with sensory devices before widespread implementation.

Uploaded by

Bryan Norwayne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
160 views13 pages

BiometricsinCybersecurity 1

The document discusses using brainwave signatures for authentication in cyber security. It notes that while other biometrics like fingerprints have increased security, hackers can still access systems. The document proposes that brainwave authentication could overcome issues by matching a user's psychological profile and revoking access if it no longer matches stored records. It describes how brainwaves are produced and how questions could generate unique signatures for authentication across devices. However, the technology is still in early stages and would require changes to computer architecture and fitting users with sensory devices before widespread implementation.

Uploaded by

Bryan Norwayne
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Running head: BIOMETRICS IN CYBER SECURITY 1

Biometrics in Cyber security

Name

Institution

Date
BIOMETRICS IN CYBER SECURITY 2

Biometric's in cyber security (Biometric's Type: Brain waves)

Abstract

For the last three decades, cyber-security has been a race to protect the privacy of internet

users while keeping cyber criminals at bay. The development of biometrics was an instrumental

step in safeguarding electronic commerce. Nevertheless, hackers can still access confidential

information and gain an authorized access. Despite these improvements, fraud in the cyber space

has been on an upward trajectory. Cyber- security experts argue that the use of brainwave

signatures for authentication will ensure security for online users. Brainwave authentication will

overcome the challenges faced by biometric authentication and give systems an opportunity to

revoke access when the psychological profile of the user does not match the records stored in the

system.
BIOMETRICS IN CYBER SECURITY 3

Introduction

Cyber-security is an arms race between cyber-security experts and cyber criminals.

Cyber-security experts in governments and private corporations are in a race to develop new

technologies that keep cybercriminals away from private data of users. Cyber-criminals on the

other hand are in a race to develop ways of by-passing passwords and security measures. The

architecture of the internet in the early 1990s only required a password for a user to access the

system. Password crackers were soon developed and hackers could easily crack the

password[ CITATION Dso19 \l 1033 ] . The next move in the cyber-security domain was secondary

authentication where the user will be provided with a code to a mobile phone number to access

the user interface. The secondary authentication introduced in addition to successful login. Soon

thereafter, hackers developed mechanisms of hijacking secondary authentication.

The next phase in cyber-security was the use of biometrics in authentication. This has

proved to be very effective in securing access to devices and secured locations [ CITATION Gup18 \l

1033 ]. However, just like the two previous attempts biometric authentication, creates loopholes

that can easily be exploited by hackers. Hackers can easily access the bio-data and get

unauthorized access. There is a need for cyber-security officials to end the arms race and offer

security to corporations and their customers. The introduction of brainwave technology in the

brainwave authentication provides a unique electroencephalogram signature that is unique to the

user[ CITATION Yan18 \l 1033 ] . Although the technology is years from full scale commercial

application, it provides a chance to end the arms race in the cyber-security and provide security

in the cyber space.

Over view of different Biometrics in cyber security


BIOMETRICS IN CYBER SECURITY 4

The internet has paved way for people in different regions of the world to interact

without meeting face to face. It has also paved way for businesses to serve customers over the

internet without a physical presence. The ease in interactions between business and customers

had led to the growth of electronic commerce. It has also led to the rise of cybercrimes which are

difficult to prosecute because they are cross-jurisdictional in nature [ CITATION Gen17 \l 1033 ] . In

an attempt to combat cybercrime, businesses have invested heavily in biometrics technology to

prevent hackers from accessing the personal information of customers. Apple has made advances

in this sector to ensure that customers can access their devices through fingerprint authentication

or facial recognition. The financial services sector in the United States and around the globe has

spent billions of dollars to develop biometric technologies and as such prevent the monumental

losses occasioned by cybercrimes[ CITATION Dso19 \l 1033 ].

The leading technologies in this sector are facial recognition, finger print identification,

iris identification, retina identification, and voice recognition and hand geometry. Retina

identification involves the analysis of the capillary vessels located in the human eye. It controls

secure access to sensitive locations such as bank vaults, military bases and other installations.

Voice recognition involves the analysis of the tone, the depth the cadence and the frequency of a

person’s voice[ CITATION Gup18 \l 1033 ] . Voice recognition has been employed in mobile phones,

personal computers and personal vehicles. These characteristics are unique to every person and

they are instrumental in deterring an unauthorized access. Finger print identification is the most

commonly used biometric information in cyber security. It is commonly used in accessing

mobile phones and allowing access to buildings. The rise of biometric in cyber security can be

attributed to defects in standard authentication methods.


BIOMETRICS IN CYBER SECURITY 5

The recent Yahoo hack where passwords and personal information of over a billion

people were exposed has led for a push for biometric authentication methods in cyber security.

Following the Yahoo hack, email service providers are arguing their users to employ a variety of

different methods in accessing their personal information [ CITATION Gen17 \l 1033 ] . Zoho email

now requires customers to use finger print identification to enable access. Finger print

technology requires both hardware and software components which are not present in the

majority of the computers that are in use. Companies are exploring other modes of biometric

authentication such as brain wave which is in early stages of development and has not been

rolled out to the public in massive scale such as voice recognition or finger print verification.

Elaborate on use of brain wave in cyber security

The human brain is an electro-chemical organ that produces electrical pattern during its

neurological functions. The human brain consists of billions of neural networks that produce

electric voltage when in operation. The electrical activity of the brain is displayed as a brain

waves. When the human brain is engaged in brain activity, it displays beta waves, beta waves are

of low amplitude and are the fastest. These signs are produced when the brain is actively

engaged. The brain produces alpha waves when it is not aroused [ CITATION Gup18 \l 1033 ] . Alpha

waves are produced when the mind is resting. When a person is day dreaming, the brain

produces theta waves. The brain produces delta waves when it is undisturbed and the person is

going through deep sleep without dreaming[ CITATION Dso19 \l 1033 ]. An analysis of the beta,

theta and alpha waves produced by a person creates an emotional profile which is unique to a

person.

The unique neural framework of a person can be detected through wearing an

electroencephalogram to measure the brain activity of the user. Instead of requesting for a
BIOMETRICS IN CYBER SECURITY 6

password, the system displays a series of questions on the screen to determine the psychological

profile of the user. The questions will be different from time to time. Each question will

generate a very unique electroencephalogram signature for the user [ CITATION Dso19 \l 1033 ]. The

brain wave activity will also determine whether the person is too drunk to function and as such

lock out the user. The system will also determine how the user responds to external stimuli. This

data will be collected as the user is introduced into the system. The unique electroencephalogram

signature created by the stimuli can easily be for authentication across multiple devices [ CITATION

Dso19 \l 1033 ].

The use of brainwave as a password on a commercial scale is a decade or two away. This

is because the unique technology will change the architecture of the internet. Changes in cyber-

security are preceded by innovations in areas such as voice recognition and finger-print

identification[ CITATION Yan18 \l 1033 ] . These new technologies are then built into devices before

it is rolled out into the public. This novel technology will have to be built into computer devices

before they can be used. For a user to use brainwave as a method of identification, he or she will

require a computer fitted with sensory identification equipment [ CITATION Dso19 \l 1033 ]. When

the user goes online, the software will compare the brainwave signature from the last point of

action and the one registering when one logs in. The information will be compared to the one

stored in the system.

If a user wants to change the password, he or she will only need to change the questions

that are to be asked for authentication. Changing the password will be easy because the brain

signature will remain the same despite the change [ CITATION Gen17 \l 1033 ]. The system will be

able to verify that the person who caused the change in verification is the same one who is using

the device. In addition to the technological changes required to support using brainwave as a
BIOMETRICS IN CYBER SECURITY 7

password, the user will also be fitted with a small sensory device that will identify the unique

brainwave. The technology at the moment requires a user to wear a helmet fitted with close to

32 sensors to capture the brainwave. However, some companies are making monumental

progress in reducing the size of the sensor so that it can easily fit inside a hat. Using brainwave

for personal authentication will be a departure from the standard authentication methods because

it will establish an emotional blueprint [ CITATION Gen17 \l 1033 ] . The emotional blue print

generated by an electroencephalogram scan will then be used to access bank accounts, credit

cards and other financial data.

Why is brain wave better than other biometrics? How to overcome the issue discussed?

Standard modes of identification only enable to user to access the system. But recent

hacks have demonstrated that someone can easily access the system through impersonation.

Once access has been granted, there is no way for the cyber security software to determine

whether the person who is accessing the device is really the one. The greatest weakness of cyber-

security is that once access has been granted it cannot be revoked unless the user logs

out[ CITATION Gen17 \l 1033 ]. Based on the activity of the user in the system, there is a need for

the system to continue with the verification procedures to ensure that the activity that is carried

out by the user is unique to the user. Brainwave authentication allows the system to identify the

unique neural patterns and ensure that the person who has been granted access is the person who

is supposed to access the system. Authentication systems are blind to the activity of the user and

with behavioral mapping of users it will be easy for companies to keep track of the user activity

and request for re-authentication[ CITATION Mog20 \l 1033 ]. This can be done through keeping a
BIOMETRICS IN CYBER SECURITY 8

confidence matrix based on the neural activity of the user. When the confidence score falls below

a particular level, access will be revoked.

Brainwave activity has been described as the most accurate in identifying a user in the

cyber-security sector. Brainwaves are not vulnerable similar levels of manipulation such as

password authentication and finger print authentication [ CITATION Mog20 \l 1033 ]. Since

brainwaves from an individual cannot be copied or replicated, you need the registered user to

operate the system. The current research into brainwave authentication will focus on moving

cyber-security from personal data such as birthday, names or place of residence. The change will

focus on behavioral traits such as alcoholism, mental health and other behavioral

patterns[ CITATION Yan18 \l 1033 ]. In addition, the brain produces unique electrical pattern which

will be used to supplement the behavioral traits of the user.

The principal aim of the use of brainwaves in cyber technology is to ensure that if a

cybercriminal is unable to by-pass access by simply acquiring the personal information of the

user. This objective can only be achieved through reducing the personal access error

rates[ CITATION Gup18 \l 1033 ] . While traditional biometric authentication systems have the

highest authentication error rates, biometric identification has the lowest and in some companies,

the error rate is at 10%. Traditional biometric authentication methods have an error rate of 80%.

The traditional biometric technologies come with potential data and privacy breaches.

This is because sensitive information, even though it’s encrypted, it is stored as data sets. Once

the criminal gains access to the confidential information, they use it to gain access to the system

and in some instances, lock out the victim. The use of brainwave in authentication and cyber-

security does away with the leakage of private information. It makes massive hacks such as the

Yahoo hack or Sony hack of 2014 unappealing because it is extremely difficult to replicate a
BIOMETRICS IN CYBER SECURITY 9

person’s brainwave activity. In addition, the technology for replacing the brainwave of a

particular person will be very expensive for lone wolf operators [ CITATION Mog20 \l 1033 ] .

Hacking is illegal in almost all the jurisdictions and the people engaged in hacking aim to incur

the least expense, hacking would be an expense running into billions of dollars and as such

unappealing to both state and non-state actors. Using brainwave activity as a method of

authentication limits the personal information that can be exposed in the case of a hack, the

technology aims at establishing psychological profiles and behavioral patterns [ CITATION Gup18 \l

1033 ]. For a hack to happen, the hacker has to determine the psychological profile of the user

and then go look for an individual with a similar psychological profile and convince this person

to participate in the hack.

Consequences of biometric information theft

Although the brain wave and other biometric technologies are still in their formative

years, the risk of information theft possess a great risk to the financial systems and personal

identification systems. Airports, banks, secure government facilities use bio data to identify and

eliminate security threats. Some airports in Dubai, Europe and United States use bio-data to

identify who is coming into and out of these regions. The use of bio-data has prevented terrorists

from travelling using airlines. The theft of bio-data could mean that terrorists could use this

information and then impersonate someone who is not in the terrorist watch list [ CITATION

Yan18 \l 1033 ]. Theft of bio data could lead to identity fraud. The fraudsters would them assume

the identity of the victim and take unsurmountable loans and incur liabilities. Credit card fraud

and identify theft are already an insurmountable challenge to credit card companies. With the
BIOMETRICS IN CYBER SECURITY 10

theft of bio-data, the victims will face difficulties in explaining that they were not involved in the

fraud[ CITATION Yan18 \l 1033 ].

While safety systems are advanced to ensure that hackers and fraudsters do not bypass

the security checks online and offline, the bad actors are developing malicious software to catch

up with the emerging cyber security technologies. The theft of bio-data could have enormous

implications to national security. Terrorists could easily steal the bio- information of the people

who are in charge of the weapons systems and launch a missile towards a hostile

nation[ CITATION Gup18 \l 1033 ] . If the loss of life caused by this attack is massive, this might

trigger an international conflict. Theft of bio-data could be detrimental to energy and

infrastrastructure projects. Hackers have attempted in the past, to shut down energy projects, or

traffic mayhem using passwords. With the bio data of the key personnel it would be impossible

to get administrative control of various infrastructure projects.

The theft of bio-data could have a detrimental impact on the criminal justice system

around the world. Conviction of offenders in the criminal justice system is based on the

identification of the offender either through eye witnesses or forensic investigations [ CITATION

Gup18 \l 1033 ]. Forensic examination requires the collection of the bio-data of the offender from

the crime scene. If hackers were able to access a directory that contains the bio-data of all the

United States citizens, this data could be planted in crime scenes causing innocent people to

serve jail terms. If these incidences happen in a massive scale, it can cause the citizens to lose

faith in the criminal justice system.

Conclusion

In conclusion, cyber criminals and hackers are usually in an arms race to by-pass the

verification systems employed in the cyber space. The goal is to access personal information and
BIOMETRICS IN CYBER SECURITY 11

deploy the same for financial gain. The private information collected by hackers is either used

for identity fraud or sold in the black market for financial gain. Initially passwords were stored as

data that could be easily accessed. These measures proved deficient and there was need to

develop other biometric- identification mechanisms to safeguard information. While biometric

verification in cyber-security is widely used, there are gaps that still allow for unauthorized

access. A hacker can easily access the bio- information of a user and impersonate him or her with

devastating consequences. The deficiencies in biometric verification in cyber-security has led to

research into the use of brain waves for authentication. Brainwaves are unique to an individual

and they develop a unique emotional profile that cannot easily be replicated. Systems using

brainwaves for user authentication will compare the user’s electroencephalogram signature with

the signature generated during the last log. Using brainwave as a means of authentication in

cyber security will be hacker-proof because the system can easily revoke access when the

brainwave does not match during the user’s activity.


BIOMETRICS IN CYBER SECURITY 12

References

Dsouza, J. (2019). Security in Cyber-Physical Systems. Amity International Conference on

Artificial Intelligence , 840-844.

Genovese, A., & Enreque, M. (2017). Advanced Biometric Technologies: Emerging Scenarios

and Research Trends. From Database to Cyber Security, 324-352.

Gupta, H. (2018). Role of Multiple Encryptions in Biometric Devices. Cyber Security, 291-300.

Mogos, G. (2020). Biometrics in Cyber Defense. MATEC Web of Conferences , 2003.

Yang , W. (2018). A fingerprint and finger-vein based cancelable multi-biometric system.

Pattern Recognition, 242-252.


BIOMETRICS IN CYBER SECURITY 13

You might also like