Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/12/2014
03:25 PM
Marilyn Cohodas
Marilyn Cohodas
Slideshows
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

6 Biometric Factors That Are Working Today

From fingerprints to wearable ECG monitors, there are real options in the market that may relegate the despised password to the dustbin of history.
Previous
1 of 7
Next

Google "I hate passwords" and you'll get 3.25 million results. If that isn’t unshakeable evidence that the world is desperate for a better solution, then I will tear up all those sticky notes pasted on my laptop.

What’s the alternative? I’m putting my money on biometrics.

Yes, biometrics have been touted for a long time. But in recent years, the technology has overcome some major hurdles --  among them cost, ease of use, and access -- paving the way for some very interesting possibilities in authentication solutions that will (hopefully) relegate the despised password to the dustbin of history.

Like any security technology, there is no perfect solution. But one thing is for sure, biometrics are no longer a futuristic fantasy. There are real solutions that are working today with even more on the horizon. Let’s take a look.

At Walt Disney World, biometric measurements are taken from the fingers of guests to ensure that a ticket is used by the same person from day to day. (Image: Wikipedia)

At Walt Disney World, biometric measurements are taken from the fingers of guests to ensure that a ticket is used by the same person from day to day.

(Image: Wikipedia)

 

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting ... View Full Bio

Previous
1 of 7
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 3   >   >>
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
8/27/2014 | 7:09:31 AM
Re: correct me if I'm wrong
It could be a combo of the "good old fashioned" password with a biometric for a while. But I still believe the future is with biometrics... especially as these factors become more common and accepted. 
Bprince
50%
50%
Bprince,
User Rank: Ninja
8/27/2014 | 12:14:47 AM
Re: correct me if I'm wrong
I still believe in the good old fashion password, but I would like to see retina scanners used. Not like Minority Report exactly, but I think as an authentication measure I find it fascinating. 

BP
Robert McDougal
100%
0%
Robert McDougal,
User Rank: Ninja
8/18/2014 | 8:10:49 AM
Re: correct me if I'm wrong
CardicRythm is pretty close, but you are right it requires that "intrusive" wearable bracelet.  I am hoping for sensors so sensitive they can detect the minute electrical fields surrounding us all.

Yeah, I am a big nerd.....
Marilyn Cohodas
0%
100%
Marilyn Cohodas,
User Rank: Strategist
8/18/2014 | 7:33:44 AM
Re: correct me if I'm wrong
Isn't that how Cardiac Rhythm works? That sounds like a pretty cool and promising biometric, although it sounds like it would require a wearable bracelet of some sort, which some people might find intrustive. (sigh)  No perfect solution. But we can't let perfect be the enemy of good!
MarilynCoh
50%
50%
MarilynCoh,
User Rank: Apprentice
8/16/2014 | 1:02:54 PM
Re: correct me if I'm wrong
Ok. I concede that there is a lot of skepticism about fingerprints -- legitimate or not. But what about some of the other types? Eye, Palm, behavioral? Does any one agree with me that some type of biometric is preferable to passwords?
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
8/16/2014 | 10:20:02 AM
Re: correct me if I'm wrong
Call me paranoid, but I don't like fingerprint authentication.  It could be because of all of those James Bond movies but I see my fingerprint as a liability.

Let's say that someone wants to authenticate as me.  They follow me to starbucks where I proceed to buy an Venti White Mocha =), which I consume in the store.  I throw my empty container in the trash and leave.  The attacke walks over to the trash pulls out my empty container and now they have my fingerprint.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
8/16/2014 | 10:16:55 AM
Re: correct me if I'm wrong
If we use DNA, what about twins?
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
8/16/2014 | 10:15:37 AM
Re: correct me if I'm wrong
Call me Mr. Sci-Fi but I would like to see authentication based on a persons unique electrical field.  Walk up to a device it detects the faint electrical field surrounding you and grants you access.
bpaddock
50%
50%
bpaddock,
User Rank: Strategist
8/15/2014 | 12:46:16 PM
Re: correct me if I'm wrong
For a short time period cars sold in Japan had fingerprint scanners in place of the door locks.  That technology rapidly went back to keys when thugs started cutting off fingers to steal the cars.

Show me a biometric scanner, such as one based on the eye, that will authenticate you after you've been hit in the face by an airbag in a car accident.  Airbags are *not* big fluffy pillows when you are going 50+ MPH.  How happy will you be that you can't call your family for help because your phone things they injured you, is not you?

 

 

 
bpaddock
50%
50%
bpaddock,
User Rank: Strategist
8/15/2014 | 12:46:06 PM
Re: correct me if I'm wrong
For a short time period cars sold in Japan had fingerprint scanners in place of the door locks.  That technology rapidly went back to keys when thugs started cutting off fingers to steal the cars.

Show me a biometric scanner, such as one based on the eye, that will authenticate you after you've been hit in the face by an airbag in a car accident.  Airbags are *not* big fluffy pillows when you are going 50+ MPH.  How happy will you be that you can't call your family for help because your phone things they injured you, is not you?

 

 

 
Page 1 / 3   >   >>
For Cybersecurity to Be Proactive, Terrains Must Be Mapped
Craig Harber, Chief Technology Officer at Fidelis Cybersecurity,  10/8/2019
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17545
PUBLISHED: 2019-10-14
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.
CVE-2019-17546
PUBLISHED: 2019-10-14
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
CVE-2019-17547
PUBLISHED: 2019-10-14
In ImageMagick before 7.0.8-62, TraceBezier in MagickCore/draw.c has a use-after-free.
CVE-2019-17501
PUBLISHED: 2019-10-14
Centreon 19.04 allows attackers to execute arbitrary OS commands via the Command Line field of main.php?p=60807&type=4 (aka the Configuration > Commands > Discovery screen).
CVE-2019-17539
PUBLISHED: 2019-10-14
In FFmpeg before 4.2, avcodec_open2 in libavcodec/utils.c allows a NULL pointer dereference and possibly unspecified other impact when there is no valid close function pointer.