Biometric Security
Overview
Biometric security is directly linked to authentication of data and it basically relies on
certain characteristics of human beings to verify that data comes from a secure and
trusted source. This type of authentication is used to protect data and strengthen
internet security.
Fingerprint scans
Fingerprint scans require you to, firstly, put your finger on a
scan and let the machine take an image of your fingerprint.
After we have the original fingerprint in the database, the
computer will make a link between the fingerprint and its
owner (the owner of the fingerprint must input their
information in the machine before taking the scan). Now that
the fingerprint is stored in the database, any person can now
put their finger on the scan and if it matches with one of the
fingerprints stored in the database of the machine, it will let
them in.
These types of scanners work by analysing in huge detail
the ‘ridges’ and ‘valleys’ that are unique to each fingerprint.
They grab the information from a fingerprint imputed by a
random user and compare it with previous fingerprints
stored in the database, and if it matches one of them, it will
let that person in.
                Advantages                                    Disadvantages
    ● Fingerprints are unique, making               ● Machines are very expensive to
      this method very safe as it is                  buy and set up.
      challenging to replicate a person’s           ● When a person gets injured, their
      fingerprints.                                   fingerprints may be altered slightly
    ● It would be impossible to sign in or            which may prevent the scanner
      log in for somebody else, which                 from recognising the fingerprint.
      prevents identity fraud.                      ● In the case of a power outage, it
      FIngerprints cannot be shared                   would be dangerous if the
    ● Fingerprints are always on your                 fingerprint scanner stopped
        hands which means you don’t have              working and trapped people inside
        to remember to carry a key.                   a building in an emergency.
Facial recognition
Facial recognition works in somewhat a similar way to
fingerprint recognition, with the slight change of using your
face instead of using your finger to identify yourself. First,
you need to register the details on your face in order for the
computer to get that information and link it with a
person/user which would be you. They manage to record
the information using software that calculates the positions
of certain features (jawline, eyes, nose, mouth, cheeks) on
your face.
And that’s it. Whenever you want to access your device or
enter a building, you just need to focus your face on the
camera and let the computer do all the work. It works in a very similar way to fingerprint
recognition, in that it grabs the image of a person’s face and compares it with other
faces stored in the database and if it matches, it will let that person in.
                Advantages                                  Disadvantages
    ● Relatively inexpensive technology.          ● You could be subject to identity
    ● It is quick and easy to use. Does             fraud because a person can print
      not require the user to carry a key,          an image of your face and may
      ID, or remember a password.                   trick the recognition device.
                                                  ● It can be somewhat inaccurate due
                                                    to changes in lighting, the person’s
                                                    age, or their hair colour.
                                                  ● These technologies could be
                                                    discriminating towards people of
                                                    colour as the machine often does
                                                    not record their facial features very
                                                    well.
Voice Recognition
For voice recognition to work, we first need a
sound detector, such as a microphone, and
a device attached which will do the work of
registering the information, processing it,
and comparing it. Similarly to other
authentication methods, the device will let
you register your voice into the database.
The computer does this by converting
analogue audio, such as your voice, into
digital audio, which consists of 1’s and 0’s.
Systems which require words will also need
to have implemented vocabulary words.
This kind of authentication method is mostly used on mobile phones and home
speakers, because it would be inconvenient to use it in a public space where silence is
mandatory such as in a library. Whenever you want to access the system, you have to
say a certain phrase and if the information matches with the one on the database, the
system will welcome you.
                Advantages                                Disadvantages
    ● It usually takes a very short time         ● Words can be misheard by the
      for verification                             machine because they are too
    ● The technology is inexpensive                similar (such as ‘hear’ and ‘here’)
    ● Allows users to multitask because          ● Background noise can interfere
      they can speak to their Google               and the machine may not work in
      Home or Amazon Alexa while                   those circumstances.
      doing something else, such as a            ● A person’s voice can be recorded
      house chore.                                 and used for malicious purposes,
                                                   tricking the machine, and leading
                                                   to identity fraud.
                                                 ● An illness such as a cold or a sore
                                                   throat can change a person’s
                                                   voice, making authentication very
                                                   difficult and inaccurate.