Page 102 - Cyber Defense eMagazine for September 2020
P. 102

public.”  (Mehedi, 2018)  This barrier of entry may encourage a potential user to select a less secure
            method of authentication.   Retina scans also utilize the eyes, however the method used has issues

            regarding cleanliness and privacy.

                   “Fingerprints and facial scans are seen as an enhanced additional layer of security, but they rely

            on database storage just like any other type of data.”  (Ikeda, 2019)  On a lower level, essentially these
            biometric values are converted into numbers via complex algorithms and stored in a database on an on-

            premise server or in the cloud.  If the servers and databases are not properly secured, encrypted, or
            protected with effective perimeter security, the data can be accessed.  Values can be changed or deleted.
            “Unfortunately, leaking of biometric source information is the inevitable next step in a long line of security

            blunders. With any authentication method, from passwords to advanced biometrics, security is only as
            strong as its weakest link.” (Ikeda, 2019) The real danger in this situation is unlike a password, biometric

            data cannot be changed, and once it is compromised the end user is not able to change them.

                   Security has seen many evolutions in my career.  From password, to username and password,

            to  multifactor  authentication,  to  biometrics,  to  biometrics  augmented  with  artificial  intelligence.    As
            information security has become more robust and complex, so have the tools to thwart these methods.
            All  cybersecurity  strategies  have  strengths  and  weaknesses.    One  must  evaluate  their  respective

            environment and determine the best strategy.




            About the Author

            Mark Perkins, MS, CISSP is an IT Manager at a Food and
            Active Pharmaceutical Ingredient Manufacturer of a globally
            traded  company.      He  is  currently  completing  his  Ph.D.  in

            Information Technology.





















            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         102
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   97   98   99   100   101   102   103   104   105   106   107