logo

Security in Devices and Network.

   

Added on  2022-09-01

5 Pages895 Words15 Views
Running head: SECURITY IN DEVICES AND NETWORK
Security in devices and network
Name of Student-
Name of University-
Author’s Note-
Security in Devices and Network._1
SECURITY IN DEVICES AND NETWORK1
Fingerprint lock of smartphone can be broken easily
Almost all individuals uses smart phones, either android or iPhones in their daily lives
and they might face a security problem with the fingerprint lock of their smartphones. As per the
news article on 2nd Nov 2019 by Forbes, the hackers in China claims to break the fingerprint lock
or any fingerprint scanner in just 20 minutes (Winder, 2020). As per the article, the Chinese
hackers have stated that they can unlock any fingerprint scanner by using equipment which costs
only $140 along with an application that can analyze the photograph of the fingerprint.
The process of authentication helps to determine if someone or something declares to be
itself. Technology of authentication provides control access for the systems to check if the
credentials of the user matches the data in database of the authorized user (Nair, Helberg, and
Van der Merwe 2016). Authentication is important in organization and in personal life to keep
security on the data and to see that only authenticated users can access the data. The fingerprint
scanners used in many devices includes unique patterns that helps to distinguish one scanner to
another. The pattern of fingerprint scanner is unique and includes intrinsic characteristics of
fingerprint scanner (Zhu et al. 2018). With all these features of fingerprint scanner to secure the
devices, the fingerprint scanner is not really that secures as it is made out to be. The biometric
data that is used in fingerprint scanner are unique and are permanently linked to you (Jo et al.
2016). So, exposure of that personal data to the hackers can compromise the privacy of the user
and also the security of the biometric system.
As per Forbes, the hackers in China who have challenged to crack the fingerprint code in
just 20 minutes works as a part of X-Lab security team in a company called Tencent in China.
The team leader of X-Lab demonstrated the hacking process in a conference in Shanghai in
Security in Devices and Network._2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Different Types of Biometric System and Privacy Enhancing Technologies in IT Risk Management
|10
|2170
|121

Biometrics in E-secure transactions
|4
|672
|306

BIOMETRIC VERIFICATION.
|3
|450
|34

Network and information Security
|13
|493
|75

The Assignment on Evaluating Biometrics in Security
|9
|1957
|23

Effectiveness of Face Recognition Technology in iPhone Data Protection
|12
|3147
|84