Page 102 - Cyber Defense eMagazine for September 2020
P. 102
public.” (Mehedi, 2018) This barrier of entry may encourage a potential user to select a less secure
method of authentication. Retina scans also utilize the eyes, however the method used has issues
regarding cleanliness and privacy.
“Fingerprints and facial scans are seen as an enhanced additional layer of security, but they rely
on database storage just like any other type of data.” (Ikeda, 2019) On a lower level, essentially these
biometric values are converted into numbers via complex algorithms and stored in a database on an on-
premise server or in the cloud. If the servers and databases are not properly secured, encrypted, or
protected with effective perimeter security, the data can be accessed. Values can be changed or deleted.
“Unfortunately, leaking of biometric source information is the inevitable next step in a long line of security
blunders. With any authentication method, from passwords to advanced biometrics, security is only as
strong as its weakest link.” (Ikeda, 2019) The real danger in this situation is unlike a password, biometric
data cannot be changed, and once it is compromised the end user is not able to change them.
Security has seen many evolutions in my career. From password, to username and password,
to multifactor authentication, to biometrics, to biometrics augmented with artificial intelligence. As
information security has become more robust and complex, so have the tools to thwart these methods.
All cybersecurity strategies have strengths and weaknesses. One must evaluate their respective
environment and determine the best strategy.
About the Author
Mark Perkins, MS, CISSP is an IT Manager at a Food and
Active Pharmaceutical Ingredient Manufacturer of a globally
traded company. He is currently completing his Ph.D. in
Information Technology.
Cyber Defense eMagazine – September 2020 Edition 102
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.

