ITC595: Biometric Authentication: A Security and Privacy Assessment
VerifiedAdded on 2025/04/30
|3
|316
|181
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes biometric authentication's security and privacy.

ITC595
Information Security
Assessment Item 3
Biometrics for authentication: security and
privacy implications
Assessment title-
Assessment no.-
Student name-
Student ID-
Student email-
Information Security
Assessment Item 3
Biometrics for authentication: security and
privacy implications
Assessment title-
Assessment no.-
Student name-
Student ID-
Student email-
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Abstract
Biometrics is the next generation technology for authentication and providing access. It is not
just limited to offices and organizations where employees sign in using their fingerprint, it is
now being widely used in mobile phones as well. Face scans and fingerprint readers in
mobile technology have become a common thing. This advancement in passwords and
authentication technology comes due to the fact that, conventional passwords might not be
the only possible and the strongest way to authenticate an individual, with biometrics an
individual’s unique physical or behavioural characteristics are verified to ensure that the
person has a valid access (Ashbourn, 2014). These characteristics are unique to every
individual and hence there is a lesser chance of someone else getting an illegitimate access to
confidential or private data. For stronger security implications, the biometric data is never
stored directly, it is encrypted and stored in a format that cannot be decrypted into the
original image. Even with so many advantages biometrics have to offer, some doubt how
securely is their data being stored with organizations because unlike passwords, once this
data is compromised, the users would not even be able to change it which might also result in
theft of identity. Another issue raised by the use of biometrics is that it violates the right to
anonymity and privacy in a way by objectifying the human body. With such issues in way, it
is important to understand how these systems work and why they are the best possible way of
providing proper authentication mechanisms (He and Wang, 2015).
Biometrics is the next generation technology for authentication and providing access. It is not
just limited to offices and organizations where employees sign in using their fingerprint, it is
now being widely used in mobile phones as well. Face scans and fingerprint readers in
mobile technology have become a common thing. This advancement in passwords and
authentication technology comes due to the fact that, conventional passwords might not be
the only possible and the strongest way to authenticate an individual, with biometrics an
individual’s unique physical or behavioural characteristics are verified to ensure that the
person has a valid access (Ashbourn, 2014). These characteristics are unique to every
individual and hence there is a lesser chance of someone else getting an illegitimate access to
confidential or private data. For stronger security implications, the biometric data is never
stored directly, it is encrypted and stored in a format that cannot be decrypted into the
original image. Even with so many advantages biometrics have to offer, some doubt how
securely is their data being stored with organizations because unlike passwords, once this
data is compromised, the users would not even be able to change it which might also result in
theft of identity. Another issue raised by the use of biometrics is that it violates the right to
anonymity and privacy in a way by objectifying the human body. With such issues in way, it
is important to understand how these systems work and why they are the best possible way of
providing proper authentication mechanisms (He and Wang, 2015).

References
Ashbourn, J. (2014). Biometrics: Advanced identity verification: the complete guide.
Springer.
He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver
environment. IEEE Systems Journal, 9(3), 816-823.
Ashbourn, J. (2014). Biometrics: Advanced identity verification: the complete guide.
Springer.
He, D., & Wang, D. (2015). Robust biometrics-based authentication scheme for multiserver
environment. IEEE Systems Journal, 9(3), 816-823.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 3
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.