18.2.2. What is Biometrics How is it used in security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/7

flashcard set

Earn XP

Description and Tags

18.2 Authentication and Authorization

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

8 Terms

1
New cards

Biometrics

Using biological or behavioral traits to identify and authenticate users.

2
New cards

Common Biometric Types:

1. Fingerprint scan – Most common.

2. Facial recognition – Used in phones and surveillance.

3. Iris/retina scan – High-security areas.

4. Voice recognition – For identity verification.

5. Behavioral – Typing pattern, gait, etc.Biological

3
New cards

Biological

DNA, blood, body fluids.

4
New cards

Morphological

Fingerprints, face shape, eye structure.

5
New cards

Behavioral

Typing, walking, speaking patterns.

6
New cards

Why Use Biometrics?

- Hard to steal or forge.

- Always with the user (can't forget it like a password).

- Often used in multi-factor authentication (MFA):

- Something you are (biometric)

- + Something you know (password) or have (token)

7
New cards

#### Risks and Concerns:

- Privacy – Can be collected without consent.

- Data theft – Biometric data, if stolen, can’t be changed.

- Spoofing – Fingerprints, faces can be faked/cloned.

8
New cards

🛡 How to Secure Biometrics:

- Use encrypted storage (preferably on the device).

- Combine with other authentication methods.

- Use liveness detection (e.g., blinking, heart-rate sensor).