1 Presented by July-2013, IIM Indore. 2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
(Biometrics Consortium)
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
Biometrics.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
By: Monika Achury and Shuchita Singh
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Biometrics II CUBS, University at Buffalo
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Chapter 10: Authentication Guide to Computer Network Security.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Chapter 21 Distributed System Security Copyright © 2008.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
Challenge/Response Authentication
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

1 Presented by July-2013, IIM Indore

2  On Internet, nobody knows who you are…  A terrorist… or a student… or a spy…?

3  Compromised Digital Certificate  Denial of Service  Data Leakage  Malware  Hacking  Cyber Squatting  Phishing  Vishing  Identity Theft  Cyber Terrorism

4  The majority of cybercrimes are cantered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK  Social networks as well as ecommerce/gov sites are major targets  6.9 million bot-infected systems in 2011  14,348 website defacements in 2011  6,850.in and 4,150.com domains were defaced during 2011  15,000 sites hacked in 2011  India is the number 1 country in the world for generating spam.

5  A single identity is associated with each individual and is fixed in time.  Individuals are not on a list of known criminals or terrorists.  Individuals have not been previously excluded (e.g., are ineligible for services, have been deported, etc.).  The claimed identity may be verified (i.e., at a point of service).  Cyber Security is about establishing trust in entities accessing your networks and ensuring that they perform functions consistent with the role you define for them.  The fundamental capability necessary for any cyber security solution is Identity Management.  Biometrics is a key enabling technology in the fight to strengthen the security of systems against cyber crime.  “Automated measurement of Physiological and/or behavioural characteristics to determine or authenticate identity”  Biometrics provide a clear benefit to counteracting cyber security threats.

6  ISO/IEC JTC 1 SC 37  ISO/IEC JTC 1 SC 27  ISO/IEC 24761:2009, Information technology - Security techniques - Authentication context for biometrics (ACBio)  ISO/IEC 19792:2009, Information technology - Security techniques - Security evaluation of biometrics  ISO/IEC Information technology - Security techniques - Biometric template protection  ISO/IEC 24760, Information technology - Security techniques - A Framework for Identity Management  ISO TC 68

IdentificationAuthentication It determines the identity of the person.It determines whether the person is indeed who he claims to be. No identity claim Many-to-one mapping. Cost of computation  number of record of users. Identity claim from the user One-to-one mapping. The cost of computation is independent of the number of records of users. Captured biometric signatures come from a set of known biometric feature stored in the system. Captured biometric signatures may be unknown to the system.

Biological/chemical based  Finger prints  Iris, Retinal scanning  Hand shape geometry  blood vessel/vein pattern  Facial recognition  ear image  DNA 8

A reflection of an individual’s Psychology  Hand written signatures  Voice pattern  Mouse movement dynamics  Gait (way of walking)  Keystroke dynamics 9

10  Eliminate memorization –  Users don’t have to memorize features of their voice, face, eyes, or fingerprints  Eliminate misplaced tokens –  Users won’t forget to bring fingerprints to work  Can’t be delegated –  Users can’t lend fingers or faces to someone else  Often unique –  Save money and maintain database integrity by eliminating duplicate enrolments  Liveliness detection & multimodal systems to combat spoofing.  Data signing, time stamp and session token mechanisms for minimizing hacking.  Coarse scoring, trusted sensors and secured channel for Denial of service.

11  Securely manage sensitive biometric data.  Ensuring the privacy of users’ personal (e.g. biometric) data.  Resisting attacks launched by insiders/outsiders.  Providing for non-repudiation of activities.  Integrating with 3rd party applications.  Scaling enterprise-wide deployments.

BUSINESS CASE - ROI COSTSBENEFITS Setting up global libraries, programming macros, validation checks Pay one time fees to set up these services Regulatory Submissions & ReportingStandardization reduces time and improves quality Training & HelpdeskTraining time reduced,helpdesk cost minimised when all sites adopt same ePRO/EDC technology Licensing FeesVolume discounts for EDC licensing fees centralized hosting Resource UtilizationHourly/Daily charges per resource 12

13  Expensive  Change with Age  Privacy Concerns  Hygiene perception  False Reading & copying  Reliability Issues

14  Biometrics offer the ability to both improve security and increase higher degrees of convenience.  Biometrics can supplement existing authentication mechanisms such as tokens and passwords.  ROI on eGov Projects may not show an picture as it is still in its infancy.

15 PPT downloaded from

16