Page 103 - Cyber Defense eMagazine for September 2020
P. 103

References
            Constatin,  L.  (2017,  Jan  27).  AI-Based  typing  biometrics  might  be  authentication's  next  big  ting  |

                   PCWorld.  Retrieved  from  PCWorld.com:  https:  //www.pcworld.com/article/3162010/ai-based-
                   typing-biometrics-might-be-authentications-next-big-thing.html
            Haughn, M. (2020, July 19). What is biometric authentication? - Definition from WhatIs.com. Retrieved

                   from SearchSecurity.TechTarget.com: https://searchsecurity.techtarget.com/definition/biometric-
                   authentication#:~:text=Biometric%20authentication%20is%20a%20security%20process%20that

                   %20relies,of%20the%20biometric%20data%20match%2C%20authentication%20is%20confirm
                   ed.
            Ikeda,   S.   (2019,   August    27).   CPO     Magazine.    Retrieved   from    CPOMagazine.com:

                   https://www.cpomagazine.com/cyber-security/breach-of-biometrics-database-exposes-28-
                   million-records-containing-fingerprint-and-facial-recognition-data/

            Mehedi.  (2018,  Jan  18).  25  Advantages  and  Disadvantages  of  Iris  Recognition  -  Biometric  Today.
                   Retrieved  from  BioMetric  Today:  https://biometrictoday.com/25-advantages-disadvantages-iris-
                   recognition/#:~:text=The%20key%20disadvantages%20of%20iris%20recognition%20are%20th

                   e,cost%20of%20the%20iris%20devices%20are%20fairly%20high.
            Newman, L. H. (2018, November 17). Machine Learning Can Create Fake 'Master Key' Fingerprints |
                   WIRED.  Retrieved  from  www.wired.com:  https://www.wired.com/story/deepmasterprints-fake-

                   fingerprints-machine-learning/
            Sputnik International. (2018, 12 31). Biometric Weakness: Many Fingerprint-Protected Devices Can Be
                   Hacked  -  Report  -  Sputnik  International.  Retrieved  from  Sputnik  International:

                   https://sputniknews.com/science/201812311071134102-Fingerprint-Protected-Devices-Hacked-
                   Report/

            Thompson,  E.  (2018,  January  9).  Understanding  the  Strengths  and  Weaknesses  of  Biometrics  -
                   Infosecurity  Magazine.  Retrieved  from  Infosecurity  Magazine:  https://www.infosecurity-
                   magazine.com/opinions/strengths-weaknesses-biometrics/

            TransUnion. (2020, July 19). BioMetric Authentication | What is BioMetric Authentication | TransUnion.
                   Retrieved  from  TransUnion  Corporation  Web  Site:  https://www.iovation.com/topics/biometric-

                   authentication












            Cyber Defense eMagazine – September 2020 Edition                                                                                                                                                                                                         103
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   98   99   100   101   102   103   104   105   106   107   108