Security Peripherals

The government needs to keep secrets, whether they are about national security or a citizen's medical records. And most government secrets are kept on computer systems, a fact that can complicate the task of keeping them secret.

By Pete LoshinSpecial to GCNThe government needs to keep secrets, whether they are about national security or a citizen's medical records. And most government secrets are kept on computer systems, a fact that can complicate the task of keeping them secret.The challenge for any secure system is to provide ready access to approved users while keeping unauthorized users out. Increasingly, passwords or passphrases of multiple words, on their own, are not enough to do the job.Biometric devices are popping up more frequently where both security and convenience are necessary. Biometric recognition systems depend on physical traits and characteristics that can be used to identify an individual. The best-known and most commonly used biometric trait for system security is the fingerprint; other traits include the face, retina, iris, speech, handwriting, hand geometry and wrist veins. Until recently, biometric approaches to access control were priced out of reach for most government uses. The need for accurate scanning devices coupled with the complex algorithms necessary for recognizing and verifying identity made for expensive systems. But in the past few years, advances in scanning and recognition technologies, along with increases in computer system speeds, have brought biometric security into the ballpark.You can limit access to secure systems based on what you know, what you have, or who you are'or on some combination of the three.What you know translates to a password used in a challenge and response sequence when attempting to access a system. This is what most users are familiar with. What you have means using a token, card key or other physical tool to access a system. And what you are means using a physical trait that can uniquely identify a user. When you use two of these, you've got a two-factor access system that should be more secure than single-factor systems; a three-factor system would be the most secure.Despite simplicity and familiarity, passwords can be easy to subvert if not used correctly. When they are too short or obvious, they can be easily guessed. But when they are too long and involved, users tend to write them down, making them even more easily stolen. Attackers have been known to shoulder-surf and steal passwords just by watching them being entered. The need for frequent password changes and different passwords for each system tend to exacerbate rather than mitigate these problems.Tokens have become quite common throughout government agencies to control access to both physical areas and computer systems. When combined with a password, the threat from lost or stolen tokens can be reduced.The problem with tokens and passwords, even when used in a two-factor system, is that they are lightly bound to a person's identity. A token may be lost or stolen, a password intercepted or guessed. This is where biometrics comes to the rescue.Depending on which trait is used, biometric identification systems can be quite effective at controlling access. The advantages of using biometric traits are that they are tightly bound to identity, tend to remain constant and are difficult to fool when properly implemented.And you won't leave your speech pattern on the kitchen counter at home or forget your fingerprints.Biometrics do present problems. A false positive can occur when someone fools the system and gets in; a false negative is when an authorized user is not recognized.The trick is to keep system sensitivity high enough to screen out all impostors, yet low enough that authorized users can pass through. Some systems can be fine-tuned for accuracy or ease of use. In high-security applications, a system can be adjusted to be so strict about matches that some authorized users may have to submit their fingerprints for scanning two or more times before they are accepted.In applications where convenience and speed is vital, recognition thresholds can be set lower, with the understanding that the system will be more vulnerable to unauthorized users.Which trait is most effective to use? For now, fingerprints win, hands down.Fingerprints have long been accepted as unique identifiers that do not change over time, and reliable fingerprint scanners are available for as little as $100, with prices even lower when bought in quantity.The greatest drawbacks to using fingerprints are cultural. ''Association with criminality and overly intrusive monitoring, as well as the reluctance of people from some societies to touch something that many other people have touched, are frequently cited as objections by vendors of competing biometric products. ''Not all people have scannable fingerprints. Members of certain occupational groups, for instance, tend to have problems scanning fingerprints.''In general, though, most other biometric traits are less acceptable for system access control. Some require sensitive and expensive equipment to differentiate among individuals. Facial recognition requires costly optical or thermal sensing devices, and voice recognition requires relatively expensive microphones for reliable control.''Retina scanners depend on lasers to probe the human eye. Iris recognition systems, while less expensive, can still cost $1,000 or more each. Scanning for the shape, size and relative positions of hand and fingers'hand geometry'calls for a much larger scanner than does fingerprint scanning. And handwriting, facial characteristics and voice can all change over time and are relatively easy to fool.''Fingerprint biometric systems generally don't store scans of fingerprints, but measure certain attributes of the fingerprint patterns and then perform a secure hash function on the values. ''When a user's finger is scanned, the system measures those attributes, performs the hash function on the scan, and compares the results with the hash stored for that user ID in its database.''The products listed in the chart include those that work in one-, two- and three-factor access control systems. Some permit access based only on scanning an authorized fingerprint; some can be used with a password, and some combine a fingerprint scanner with a smart-card reader, capable of providing three two-factor combinations or a three-factor combination with fingerprint recognition, a smart card and a password.''All of the devices listed are intended for use with computer systems. Biometric devices that control other kinds of access, such as to buildings, are not included.''Computer access devices differ in several ways. Some rely on software installed on the controlled computer for processing, database and access control services. Others are autonomous, performing all processing and data storage onboard. ''Some are intended for use as standalone devices, controlling access to a single system, although most are designed to be integrated into existing network security infrastructures such as those provided through Microsoft Windows NT 4.0, the Entrust public-key infrastructure, or Novell Network Directory Services.''Almost all biometric products require software to make the recognition, compare the recognized biometric value with a database, store and access the database, and control what happens after a biometric value is evaluated. ''Almost all users want a challenge and response style interaction, in which users are scanned before gaining access to a system. ''Many vendors make available an application programming interface, software development kit or other programming tools to allow users to build custom security applications to restrict access.''Choosing the right product is a matter of doing all the research on vendors' products and your own requirements. In a networked environment, you'll need a product that can be integrated with existing, single sign-on products and other elements of a security infrastructure. ''In a mixed-platform environment, you'll need either a product that can work with all platforms or several products that can interoperate.''The more vital security is to your mission, the more important it is to scrutinize biometric products for potential security flaws or weaknesses. And keep in touch with vendors; many of those on the chart have announced or are about to roll out updated or new versions of their products. ''Digital Persona plans to ship a networked version of its U.are.U fingerprint scanner, and vendors indicated they would be adding to their interface options and platforms.''To find more information on the technology, particularly as biometrics relate to government activities, visit the Biometric Consortium's Web site, at www.biometrics.org. ''The consortium is a group that serves as a focal point for the government's activities relating to research, development, testing and application of biometric-based personal identification and verification technology. ''Pete Loshin, author of Extranet Design and Implementation, writes about networking and can be reached at .
New biometric technologies can let agencies tighten access controls to critical systems



































Middle of the road





























Picking a winner















Watch for updates









pete@loshin.com
X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.