Is biometrics enough to protect our property, our money, our family, and our very lives?
Security and tech analysts are usually the first to say a cautious “yes” to this. The traditional use of passwords and other encrypted information has shown itself vulnerable to cyber attacks from hackers bent on stealing the user’s information. All it takes is an inventive mind, enough familiarity with the movements of the online space, and enough time for the cyber intruder to glean your security protocols, neutralize them and raid your treasure trove. If Yahoo!’s billions of emails have been compromised, and Google is regularly stepping up its firewalls and other protective virtual platforms, then no one is safe. Nor should anyone remain complacent.
Biometrics, however, has posed as a promising alternative because it uses elements of the human body and its physiologies as the protocols of a security system. In 1982’s Star Trek: The Wrath of Kahn, the computer scanning of his retina to verify his identity was considered ingenious. Today, it is run-of-the-mill. Nobody was awed or dumbfounded in The Avengers movie when the villain Loki dug out a hapless executive’s eye from its socket to enter his precious vault.
Aside from the visual cortex, fingerprint, voice and facial recognition are among the most used tools of biometrics. The confidence that many have placed in the field is understandable. While identifying a password or lifting it from a database is doable, it is impossible to totally fake another’s DNA, exact facial features, and a fingerprint mark. Loki’s eye theft, fortunately, remains within the purview of science-fiction.
Another advantage of using biometrics is that the user has zero risks of losing them. You might forget your password or even your security protocol, but you certainly can’t change your skin tone, eye flicker, or voice modulation.
Gulf News names two ways by which biometrics is being used by industries in everyday life, at least in the developed countries. Facial and voice recognition are regularly employed in airports and other public places to ferret out terrorists, criminals, and other wanted parties from the rest of the crowd. A suspect in disguise may be able to fool a human inspector, but facial recognition software may see him through his mask.
Another way by which biometrics is used is selfie banking. Banks regularly ask account holders to authenticate themselves during transactions. Often the methods resort to voice verifications with confidential data being asked for the phone. Biometrics will simply require the account holder to take his selfie on his camera and send it to the bank where software algorithm will compare his pictures to past profiles and greenlight his identity.
According to Forbes, Apple Pay is elevating the practice a few steps higher. Instead of sending his credit card information over the phone to pay for a product, the user will just be asked to scan and send a biometric feature like a fingerprint or a facial mark.
Still, for all its attractions, biometrics has its limitations and challenges. One should not just employ them hastily and without preparation.
First, theft of biometrics is possible. Any hacker who has the tools and the know-how can crack any corporation database and steal the biometric data of its employees. This is not hypothetical; Wired reports that about the fingerprints of 6 million government workers were stolen from the U.S. Office of Personnel Management.
Second, as Dark Reading points out, this kind of theft opens up the users and account holders to other and possibly worse nightmares. To compare: stolen credit card information can force the poor user to pay for the thief’s online shopping. However, the theft of his fingerprint can land him in hotter waters, as the thief may use said fingerprint to create driver’s licenses, access social security benefits, or even fake medical conditions to get hospital benefits.
Third, biometrics has still to be proven 100 percent effective when it comes to detecting and curtailing violence such as acts of terrorism. Facial recognition may tip the hand of a disguised terrorist, but immediate intervention at the metal detector counter can lead to the shootout that the authorities are trying to prevent.
Biometrics is a viable option for protecting people and property from a theft of the cyber and physical kind. However, it also carries its share of risks and precautions must be in place as it is deployed. It might not yet be the great all-
encompassing answer to security, but it can come close.
(Featured image via DepositPhotos)
How This Alkaline Water Producer Plans to Dominate the $600 Million CBD Beverage Market
The Alkaline Water Co. (OTCQB:WTER) (TSX-V:WTER) plans to use its significant experience to dominate a market few had the foresight...
How to save on tax bills using a SEP IRA
There are three ways in which a SEP IRA can help individuals save on taxes while boosting their retirement savings...
3 desktop and mobile apps that take productivity to new heights
There are many productivity apps that are available for various devices. Here are three that will help boost your productivity.
North America remains world’s primary consumer of oil
A spectrum of opinions exists over the use of fossil fuels and renewable energy while political constraints keep getting in...
Billionaires remain Bitcoin true believers
With Bitcoin price continuing to drop, many have lost faith in its future, but a handful of billionaires still believe...
Auto5 days ago
8 reasons why bike-sharing startups are attracting investors
Featured3 days ago
How singles should plan for retirement
Business4 days ago
Earthquake highlights need to overhaul Port of Alaska
Business3 days ago
India’s tech scene brings in foreign investments
Featured3 days ago
How to manage your 401(k) plan in a time of market volatility
Featured4 days ago
Apple could stay in bear market territory until next year
Agriculture3 days ago
China should heed Russia’s lesson to salvage pork industry
Entrepreneurship5 days ago
Why apps should be part of your business digital transformation