Biometrics Flashcards

1
Q

What are biometrics?

A

Biological authenticators based on physical characteristics that are used in login.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the issues with biometrics?

A

Have privacy issues as biological authenticators have to register biological metrics.

Uptake slow due to expense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where are biometrics usually used?

A

Due to expenses in high-security areas such as military bases and airports.

Becoming ubiquitous in mobile phones and personal computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the ways that identity can be confirmed using biometrics?

A
DNA
Keystroke Dynamics
Gait Analysis
Iris Scan
Fingerprint Scans
Gestures
Voice recognition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a limitation of enrollment when using biometrics?

A

Systems require a large amount of data to sample when building statistical models.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What issues are there when setting an acceptance threshold?

A

False acceptance rate
False acceptance rate

Need to find a threshold that minimizes whatever one is more critical, while still ensuring that the other doesn’t occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens at enrollment onto a system?

A

Data is collected and authenticated
A template is built and sent to data storage
The built template is then checked using the data that was captured to ensure that it verifies and accepts the login.

Correction and remove of data can happen where required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens on login into a system that uses biometrics?

A

Data is extracted and then the system attempts to find the user it identifies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are fingerprint classification built using?

A

Whorls, loops and arches on the finger.

These can degrade over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does face recognition identify a user?

A

Uses overall facial structure, the distance between outer and inner eye pairs as well as nose and mouth points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why are people generally more open to face recognition than other forms of biometric?

A

People are used to photos of their face being used for ID and taken on a daily basis already.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What identifiers are used when using iris scanning?

A

Rings of the iris
Furrows of the eyes
Corona of the tissue that it radially divides the iris.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are soft biometrics?

A

Biometrics that change with time, such as height, weight, gait and hair color.

These are used to prune the search of individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the advantages of using a knowledge-based password

A
Low Cost
Easy to use
Easy to implement
No special devices needed
Familiar to users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the disadvantages of using a knowledge-based password?

A
Less secret with every use
Can be easily guessed
Multiple attack scenarios
Users tend to choose weak passwords
Multiple passwords required
Doesn't identify the user uniquely.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the advantages of using a possession-based password?

A

Relatively low cost
Relatively hard to copy
Robust
Two-Factor Authentication when used on top of a knowledge-based password

17
Q

What are the disadvantages of using a possession-based password?

A

Device can be forgotten or stolen
Device can be tampered with
Doesn’t identify the user

18
Q

What are the advantages of using a biometrics-based password?

A

Identifies the user
User must be present to login
Don’t need to remember a password or possession to login
Can’t be guessed
Can’t be lost or forgotten
Can’t be transferred
Can be used on legacy systems - stores hashes etc

19
Q

What are the disadvantages of using a biometrics-based password?

A

Cost intensive
Hard to implement
Some are low accuracy
Low user acceptance
Some are susceptible to attacks, such as voice clips
Hard to identify suitable thresholds
Compromised or stolen biometrics are lost forever
Not all users can be enrolled
Not all biometrics are consistent over a lifetime