1/7
18.2 Authentication and Authorization
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Biometrics
Using biological or behavioral traits to identify and authenticate users.
Common Biometric Types:
1. Fingerprint scan – Most common.
2. Facial recognition – Used in phones and surveillance.
3. Iris/retina scan – High-security areas.
4. Voice recognition – For identity verification.
5. Behavioral – Typing pattern, gait, etc.Biological
Biological
DNA, blood, body fluids.
Morphological
Fingerprints, face shape, eye structure.
Behavioral
Typing, walking, speaking patterns.
Why Use Biometrics?
- Hard to steal or forge.
- Always with the user (can't forget it like a password).
- Often used in multi-factor authentication (MFA):
- Something you are (biometric)
- + Something you know (password) or have (token)
#### ⚠ Risks and Concerns:
- Privacy – Can be collected without consent.
- Data theft – Biometric data, if stolen, can’t be changed.
- Spoofing – Fingerprints, faces can be faked/cloned.
🛡 How to Secure Biometrics:
- Use encrypted storage (preferably on the device).
- Combine with other authentication methods.
- Use liveness detection (e.g., blinking, heart-rate sensor).