Actual work where 2 students given their post on this:Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a per

Security Threats Of Biometrics

Biometric uses human physical features to provide verification of one’s identity. It involves recording of some of the salient features from different set of individuals. Some of the features captured involves the following: It records ones fingerprints, face, eye’s iris, one’s voice, hand geometry and other behavioral characteristics. Biometric systems used a sensor, a computer and a software to verify one’s identity (Tolosana et al, 2020). Many biometric systems are prone to serious security risks.

 It is true that when there is malicious access to information stored by the biometric systems, individuals’ information is prone to some risks. Some of these risks include the following:

1.) Denial Of Service.

Unlike other identification and verification techniques like the use of passwords which can be changed, biometric information cannot be changed. Once this information gets to unauthorized individuals, the real user will be denied access to the system because one cannot change the fingerprint and iris scan. It therefore means that immediately one’s information is accessed, he/she is be totally denied the service.

2.) Access to confidential information which leads to high loses.

Many hackers tend to go for the biometric information. They end up duplicating some of the feature’s recorded based on different individuals. Some hackers may take an image which is of a high resolution based on salient features like the face or even get fingerprint left on the sensor scanner’s glass. They may end up using this kind of information to maliciously access one’s account or even one’s device (Gomez et al, 2020). This put individuals’ information at higher risks thus withdrawing some of the security elements like confidentiality and integrity.

Many organizations use biometric for verification, this creates several duplicates of individual’s information. The difference in security measures put in place may be bypassed by hackers and this may expose one’s information. High profile information gets into the wrong hand which may exploit different users. The confidential information stolen puts both the individual and the organization at a higher risk.

References

Tolosana, R., Vera-Rodriguez, R., Fierrez, J., & Ortega-Garcia, J. (2020). BioTouchPass2: Touchscreen Password Biometrics Using Time-Aligned Recurrent Neural Networks. IEEE Transactions on Information Forensics and Security15, 2616-2628.

Gomez-Barrero, M., & Galbally, J. (2020). Reversing the irreversible: A survey on inverse biometrics. Computers & Security90, 101700.