Page 80 - Cyber Defense eMagazine - November 2017
P. 80

BIOMETRIC BEST PRACTICES


               In the identity-based world we live in, passwords seem to hold the key to our identities. But with
               a  majority  of  Americans  (64  percent)  personally  experiencing  a  data  breach,  our  long  held
               tradition of safeguarding our wealth and personal information using a secret word or phrase is
               being turned on its head.

               This past September, Deloitte was hit by a cyber-attack, compromising the emails of some of its
               blue-chip clients. Hackers had access to information including usernames, passwords and IP
               addresses. It’s been reported that the hacked account only required a simple password. Hacks
               such as Deloitte and others underline the utmost need to ensure the safekeeping of information.

               Enter biometrics. By leveraging your face, voice, eyes and behaviors, biometrics is upending
               our world and is helping us reclaim our right to our rightful identity. So much so that biometrics
               has entered the mainstream in today’s society, being adopted by big companies such as Apple
               (new Face ID) and Amazon (Alexa).

               In order to implement biometric systems, there are do’s and don’ts that need to be considered.
               In  the  end,  the  most  important  thing  is  the  consumers.  They  need  to  feel  safe  and  trust
               biometrics to be their new form of identity and there are certain steps that can do just that.

               Here are some best practices:

                   1.  Take  a  platform  approach:  The  best  way  to  incorporate  biometrics  into  an  existing
                       infrastructure  is  to  take  a  platform  approach  to  the  consumption  of  biometrics  into
                       applications – meaning that you don’t just focus on one type of biometric or one piece of
                       hardware.  Whether  you’re  a  financial  institution  or  data  center,  by  taking  a  platform
                       approach,  biometrics  can  continue  to  innovate  and  evolve.  Many  might  fall  into  the
                       pattern of using simple point-to-point integration which only causes a piece of code to
                       become frozen in time and bound to a single biometric. Developers will pick a favorite
                       biometric and stick with it, but by using a platform approach, systems can integrate one
                       biometric and then easily add on additional methodologies.

                   2.  Incorporate  risk-based  authentication:  Multi-factor  authentication  is  not  enough  in
                       order to eliminate spoofing from the biometric space. Critics of biometrics will point to
                       spoofing, which is defined as the ability to imitate or fool a physical security application.
                       As we’ve all encountered, one study by Keeper Security found that more than 80 percent
                       of people reuse the same password across multiple accounts showing that convenience
                       will  trump  security  any  day.  Higher  risk  transactions  such  as  a  bank  wire  transfer  for
                       $10,000 should not be given the same weight as lower risk transactions, for example
                       sending your coworker $5 for the coffee they bought you. Instead, the focus should be
                       on  the  relationship  between  risk  and  trust.  For  higher  risk  transactions,  multi-factor
                       authentication  using  multiple  biometrics  and  liveness  detection  can  create  the  most

                   80    Cyber Defense eMagazine – November 2017 Edition
                         Copyright © 2017, Cyber Defense Magazine,  All rights reserved worldwide.
   75   76   77   78   79   80   81   82   83   84   85