From the course: Threat Modeling: Spoofing In Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Attacking what you are

Attacking what you are

From the course: Threat Modeling: Spoofing In Depth

Start my 1-month free trial

Attacking what you are

- Biometric systems measure or assess physical facts about a person. It's tempting to think that that makes them the most secure type of factor. Biometrics involve presenting an identifier and authentication information. That information might be a photograph evaluated by a guard. Traditional biometrics like appearance or signatures are evaluated by a person. It's notoriously hard to match a person to a small picture of them. Often that picture was taken years earlier, and forgers have been faking signatures for far longer. More technological biometric systems usually have a sensor that measures something like seven points on a fingerprint or the pattern of veins in a hand. It can also measure something more complex, like the way a person walks or types. That measurement is tuned against a set of false positive or false accept rates and false negative rates, also called insult rates. Usually the two are tied and improving one makes the other worse. Sometimes sensors are carefully…

Contents