Biometrics in Pharma: Politics and Privacy Daniel Shapiro * and Sidney Shapiro + * School of Information Technology and Engineering, University of Ottawa.

Slides:



Advertisements
Similar presentations
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Chap 1: Overview Concepts of CIA: confidentiality, integrity, and availability Confidentiality: concealment of information –The need arises from sensitive.
1 No Silver Bullet : Inherent Limitations of Computer Security Technologies Jeffrey W. Humphries Texas A&M University.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
U.S. Department of Justice Drug Enforcement Administration Office of Diversion Control Electronic Prescriptions for Controlled Substances Michelle Ferritto,
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
FIT3105 Smart card based authentication and identity management Lecture 4.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Liveness Testing Shivankush Aras. Threats to Biometric System Artificially created biometrics: e.g. image of a face or iris, lifted latent fingerprints,
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Biometrics and Authentication Shivani Kirubanandan.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter 10: Authentication Guide to Computer Network Security.
Securing Information Systems
The Office Procedures and Technology
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 1 “Overview”. © 2016 Pearson.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Terms of Service Agreements What does the fine print really contain?
Access Control / Authenticity Michael Sheppard 11/10/10.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Computer Security Set of slides 8 Dr Alexei Vernitski.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Information Systems Design and Development Security Precautions Computing Science.
An Introduction to Biometrics
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Challenge/Response Authentication
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Presented by: k.ramya krishna
Presentation transcript:

Biometrics in Pharma: Politics and Privacy Daniel Shapiro * and Sidney Shapiro + * School of Information Technology and Engineering, University of Ottawa + Department of Political Science, Laurentian University

Overview 1.Prescription of Controlled Substances 2.Trends in Google Searches, News, Regions 3.Spam and Other Marketing 4.Biometric Prescriptions: Practical, Political, and Privacy Issues 5.The Impact of Technology 6.Conclusions

Prescription of Controlled Substances The Drug Enforcement Agency (DEA) has announced the implementation of the use of both computerized and biometric security protocols in the electronic prescription of controlled substances. Electronic prescriptions which were up until this point not allowed to be prescribed by electronic means will now be easier for physicians and the DEA to monitor and prescribe.

USA Google Searches Raw Data with ±5% ErrorTrends Pharmacy searches ↑ Prescription, privacy searches ↓ Implication is ↑ use of illegal online pharmacies in the USA In 2004, ¼ of Americans had looked online for drug information, and four percent purchased drugs online [Fox04]

Breakdown by Region

News Coverage in USA Raw Data with ±5% ErrorTrends News coverage of privacy and prescriptions is ↑ News coverage of pharmacy is ↑ too “Prescription drugs online” 2004 indicates ↑ use of online pharmacies [Fox04] pharmacy prescriptionprivacy

Spam and Other Marketing

Biometric Prescriptions: Practical, political, and privacy issues Practical Biometrics Issues: Non-repudiation Improved accountability Delegation prevention Possible increased cost Possible information security concerns False acceptance and false rejection cases Possible serious medical consequences when a drug cannot be obtained due to failed biometric authentication. Political / Privacy Biometrics Issues: RiteAid installs fingerprint scanners in their pharmacies 2004 Less privacy (summarizing data) Policy issues (HIPAA/ETP/PIPEDA/others) Legal issues (selling prescription data) Human factors (fear, misconceptions)

The Impact of Technology Cryptography and Systems Service interruptions due to power failures or DDoS. Biometrics systems would be unable to function without access to communication and information unless the data was stored locally, negating the usefulness of a large scale distributed system. PKI is slow but secure. Biometrics Degraded biometric Combination of several biometrics in order to improve accuracy A certificate authority cannot reissue a biometric. Fingerprint scanners can identify fake fingerprint attempts using sensors to observe the finger temperature, pulse, oxygenation, blood pressure, movement, and electrical resistance.

The Impact of Technology Cryptography and Systems Certificates are preferred over scans due to data size. Digital signatures disallowed in many jurisdictions. Risk-based approach for data encryption. Clearly a prescription for a controlled substance would fall under the category of a high-risk, and would be heavily encrypted. Hardware failure in any component in the system including cameras, fingerprint scanners, barcode readers, and computers. Biometrics Hackers could begin harvesting biometric information from poorly secured e-health system. Setting up a fake service with the express purpose of aggregating biometric information. Sometimes it is cheaper to pay off the bad guys. Biometric software failure due to a bug in the implementation.

The Impact of Technology Cryptography and Systems DEA says you need 2 IDs + biometric. This is like saying you need a biometric + password… Then why use the biometric? As we said earlier, combining certificates reduces false accept/reject. Biometrics A replay attack is a case where a biometric has been copied by a third party and is being used (fraudulently) to authenticate. Picture of a doctor's face in the parking lot, and then displaying the photo to a biometric face scanner. Secure authentication, secure data transmission, cost-effective security, and fast execution of security mechanisms are all highly desirable when implementing biometrics and electronic prescriptions on a large scale.

The Impact of Technology Impact of Artificial "Gummy" Fingers on Fingerprint Systems Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, Satoshi Hoshino Graduate School of Environment and Information Sciences, Yokohama National University 79-7 Tokiwadai, Hodogaya, Yokohama , Japan, ABSTRACT Potential threats caused by something like real fingers, which are called fake or artificial fingers, should be crucial for authentication based on fingerprint systems. Security evaluation against attacks using such artificial fingers has been rarely disclosed. Only in patent literature, measures, such as "live and well" detection, against fake fingers have been proposed. However, the providers of fingerprint systems usually do not mention whether or not these measures are actually implmented in emerging fingerprint systems for PCs or smart cards or portable terminals, which are expected to enhance the grade of personal authentication necessary for digital transactions. As researchers who are pursuing secure systems, we would like to discuss attacks using artificial fingers and conduct experimental research to clarify the reality. This paper reports that gummy fingers, namely artificial fingers that are easily made of cheap and readily available gelatin, were accepted by extremely high rates by particular fingerprint devices with optical or capacitive sensors. We have used the molds, which we made by pressing our live fingers against them or by processing fingerprint images from prints on glass surfaces, etc. We describe how to make the molds, and then show that the gummy fingers, which are made with these molds, can fool the fingerprint devices.

Conclusions Online pharmacy popularity ↑ using legal prescriptions Practical, political, and privacy concerns must be addressed in tandem. Market acceptance is possible (RiteAid) Biometric, hardware, cryptographic mechanisms for securing prescriptions are complex

Questions?

References Background image: /2006/11/28/eprescriptions/# /2006/11/28/eprescriptions/#