SlideShare une entreprise Scribd logo
1  sur  25
© Copyright Daon, 2009 1
Biometrics and Cyber SecurityBiometrics and Cyber Security
Key Considerations in Protecting CriticalKey Considerations in Protecting Critical
InfrastructureInfrastructure –– Now and In The FutureNow and In The Future
Conor White, Chief Technology Officer, Daon
© Copyright Daon, 2009 2
Why is Cyber Security
Important in the Context of
Biometric Systems?
© Copyright Daon, 2009 3
Cyber Security & Biometrics
 On the Internet, nobody knows you are a dog….
Or a terrorist …Or a student … Or a spy…
© Copyright Daon, 2009 4
Identity is More Valuable than Money!
“I can’t think of a single piece of information more critical to our ultimate
security and prosperity, both as individuals and as a country, than our personal
identity. The ability of an individual to establish identity, to verify “you are
who you claim to be”, is critical to the many transactions that occur in a single
day. As the world becomes more interdependent, as transactions become more
global, and as the world embraces identity management and assurance as an
element of conducting business, personal identities will become a form of
global currency. Whether you are crossing a border, seeking employment,
applying for a public benefit, opening a bank account, combating crime, making
a purchase, enforcing immigration policy, granting access to public and private
spaces, detecting terrorists ---- identity verification has limitless value.”
Governor Tom Ridge
Former Secretary, Department of Homeland Security
© Copyright Daon, 2009 5
Identity Management is Fundamental to Cyber
Security
 Cyber Security is about establishing trust in
entities accessing your networks and
ensuring that they perform functions
consistent with the role you define for them.
 The fundamental capability necessary for
any cyber security solution is Identity
Management.
• Biometrics is a key enabling technology in the
fight to strengthen the security of systems against
cyber crime
 However…
© Copyright Daon, 2009 6
…Biometric Identity Systems Will Be Attacked!
 In this session we will discuss (briefly)
the following cyber security topics as
they relate to Biometric Systems:
1. System Level Perspective
2. Person Level Perspective
3. Independence, Flexibility, Ongoing
Analysis and Adaptation
© Copyright Daon, 2009 7
Attacks on Biometric Systems
Consider the following:
 Don’t have to duplicate to spoof – you just need to alter to ensure no 1:1 or 1:N
match (negative identification scenarios)
 As our databases grow, we struggle to achieve universality
 As we seek to automate, unattended acquisition and authentication creates risk
 As more systems are deployed, frequency and sophistication of attacks will
increase
• Microsoft OS virus vs Apple OS virus
 No Biometric modality is perfect – don’t believe anybody who tells you otherwise
 No silver bullet - lots of papers & patents but few commercial offerings
 Industry starting to look more seriously at liveness detection – e.g. LivDet 2009
Biometrics provide a clear benefit to
counteracting cyber security threats – but
biometric systems can themselves be a
source of weakness
© Copyright Daon, 2009 8
How Do We Compete?
 Countermeasures are required:
• Enhanced Capture Software
• Secured Systems
• New Capture Devices
• Multi-factor
• Multi-modal
• Supervision & Oversight – guiding standard and principles
• Ability to react through flexible technology and process
 Biometric matching has been a technology- and tool-centric field.
 A Defense-in-Depth method of dealing with biometric & identity-related
concerns takes a more holistic approach:
People
Technology Operations
© Copyright Daon, 2009 9
Biometric System Threats &
Countermeasures
© Copyright Daon, 2009 10
Biometric System Vulnerabilities
Key Considerations:
• There is no perfect identity authentication method – every form of
authentication has vulnerabilities
• The entire identity eco-system is vulnerable to attack
• Don’t just secure the point of authentication
• Consider systemic weaknesses as well
• Must provide a defense-in-depth strategy
Signal
Processing
Data
Collection
Matching
Storage
Decision
Verifier
1 2 3 4 5
6
7
8 9
10
11
Person
Perspective
System
Perspective
Source: Study report on Biometrics and E-Authentication
© Copyright Daon, 2009 11
First Principle of Cyber Security
Security by Design
 Security should be designed into a solution and not “bolted on” after the fact
 All solutions MUST be designed using industry-best security principles
• Encryption of data – both in transit and at rest
• Use of strong cryptographic techniques (e.g. HSMs)
• Robust key management
• Non-repudiation of events
• Authorization of function
• Integrity protection – data and system
• Uses industry proven techniques – no “security by obscurity”
Biometrics systems are vulnerable to attack at several
points in the process: data collection, signal processing,
data storage, and decision/action point
© Copyright Daon, 2009 12
Location Threats Example Countermeasures
1 – Data Collection Spoofing Liveness detection - Challenge/response
Multi-modal, policy-based
Device substitution Mutually authenticate device
Vendor agnostic architecture
2 – Raw Data
Transmission
Replay attack Sign data, timestamp, session tokens/nonces, HSM,
FIPS
3 – Signal
Processing
(Software) Component
replacement
Sign components
5 – Matching Manipulation of match
scores
Debugger hostile environment
Hill climbing Coarse scoring, trusted sensor, secure channel, limit
attempts
7 - Storage Database compromise
(reading/replacing
template, changing
bindings)
DB access controls, sign/encrypt templates, store on
secure token
Audit, digital signature
9 – Decision Threshold manipulation Protected function, data protection
Signal
Processing
Data
Collection
Matching
Storage
Decision
Verifier
1
2
3
4
5
6
7
8
9
10
11
Person
Perspective
System
PerspectiveDefense in Depth
So How do We Design in
the Countermeasures?
© Copyright Daon, 2009 13
And Don’t Forget about Data Security
 Provide an authentication
framework that
• Securely manages sensitive
biometric data.
• Ensures the privacy of users’
personal (e.g. biometric) data.
• Resists attacks launched by
insiders/outsiders.
• Provides for non-repudiation
of activities.
• Integrates with 3rd party
applications.
• Scales to enterprise-wide
deployments.
• Is biometric-agnostic by
design.
 Biometric data must be stored
securely
• Privacy concerns (legislation)
• Risk of legal challenges to
signatures if stolen
 Assume a hostile network
• Eavesdropping on sensitive
traffic.
• Injection/deletion of messages
 Assume a hostile environment
• Database may be
compromised.
• Machines may be physically
attacked.
• Attacks launched against OS
or Daon software.
© Copyright Daon, 2009 14
In Summary
 Biometrics enable stronger defense against cyber security
attacks but biometric systems need to ensure that they
don’t become a platform for launching an attack
themselves
 Design Security In – Don’t just bolt it on
• Protect biometric systems using a holistic approach
• Ensure all data is encrypted (in motion and at rest)
• Ensure robust key management and distribution
• Signing of all parties in a transaction
• Tamper evidence and integrity checks throughout system
• Audit trails and non-repudiation
• Consider all points in a solution and look for vulnerabilities
 Its NOT just about the matching algorithm!
© Copyright Daon, 2009 15
Person-Oriented Attacks &
Countermeasures
© Copyright Daon, 2009 16
Person Oriented Attacks
 Historically the focus has been finger, face, and iris however, there are
several modes being refined: vein, voice, iris on the move,….
 To defeat a biometric system, sometimes it is sufficient to cause
distortion (i.e. to not match).
• Example, distortion of fingerprints to avoid watchlist hits
 Universality/Inclusivity becomes a major issue for large populations
 Multi-Modal solutions work best
 Systems need an adaptive architecture that can incorporate these new
modes and leverage technology improvements over time
The most progressive, modern systems begin as a multi-biometric platform with
built in systemic security & privacy safeguards and
add different biometric capabilities as needed over time!
© Copyright Daon, 2009 17
Multi-biometric Fusion
 Use fusion to improve accuracy and robustness
• Increase accuracy beyond single biometric matching
• Reduce FTE (broaden population)
• Spoof/denial resistance
• Cope with poor quality data
• Sensor/user fault tolerance
 Fusion performance depends on:
• Input data available
• Comparison algorithm accuracy
• Correlations between different matcher scores
• Fusion technique
• Training data
© Copyright Daon, 2009 18
Multi-Biometric Fusion in Action
 Choose a platform that
enables multiple biometrics
to ensure optimized
performance
 Multi-biometric systems
provide key advantages:
• Increased accuracy (noise
reduction)
• Enhanced Usability
• Greater Universality
• Improved Security
• Improved performance
(FMR, FNMR)
 As enrollment populations
grow dramatically, multi-
modal solutions are
inevitable.
Performance of large scale identity programs can be significantly
improved through the use of multiple biometrics.
Large scale systems should establish a core multi-biometric platform
first and then choose the most applicable algorithms to suit their
population, commercial and performance needs
0.1000%
1.0000%
10.0000%
100.0000%
0.0001% 0.0010% 0.0100% 0.1000% 1.0000% 10.0000% 100.0000%
False Match Rate (FMR)
FalseNon-MatchRate(FNMR)
Face
Finger
Sum fusion
Product fusion
© Copyright Daon, 2009 19
In Summary
 There is NO perfect biometric type
 There is NO perfect biometric device or algorithm
 Biometric performance will continue to increase over time, costs will
decrease
 Spoofing attacks will continue and gain in frequency and complexity
 A flexible framework is needed to counteract these attacks
 Multi-biometric systems provide best defense – with ability to
continually add new technology components
 Policy based normalization and fusion should be kept independent of
biometric matching algorithms
 Adopt a platform that enables you to take advantage of technological
improvements over time
© Copyright Daon, 2009 20
Technology Flexibility,
Ongoing Analysis and
Adaptation
© Copyright Daon, 2009 21
Analysis and Adaptation
 Question: How do you react to:
• Biometric technologies continuously changing
• Weaknesses identified in specific algorithms or devices
• Spoofing techniques continuously improving
• New normalization and fusion techniques emerging
• Throughput and performance models emerging
• …
 Answer: Deploy an analysis and adaptation engine that enables you
to do “what-if analysis” and understand consequences of changes
ahead of implementation
 Identify and correct weak points ahead of cyber attackers
 Automate performance analysis of what-if scenarios:
• Algorithms: Matching, Quality, Fusion
• Devices/sensors
• Interoperability: Cross-device analysis, multi-algorithm scenarios
• Protocols e.g. 1:1, 1:N, #attempts, preferred sample types
© Copyright Daon, 2009 22
Which Fusion? DETs
1.0E-03
1.0E-02
1.0E-01
1.0E+00
1.0E-06 1.0E-05 1.0E-04 1.0E-03 1.0E-02 1.0E-01 1.0E+00
False Match Rate (FMR)
FalseNon-MatchRate(FNMR)
517_Face_C
517_Finger_LI
SUM: MinMax
SUM: Zscore
SUM: MAD
SUM: TanH
PROD: FNMR
PROD: Liklihood
© Copyright Daon, 2009 23
Self Optimizing Framework for Analysis and
Adaptation
Biometric
Performance
Analysis
Engine
Results
Analysis
Policy Based
Biometric
Platform
Biometric
Performance
Analysis
Engine
© Copyright Daon, 2009 24
In Summary
 Vendor independence provides both a monetary ROI and a cyber-
threat risk mitigation
 Leverage concept of master broker to orchestrate operations of
biometric components
 Ensure a vendor independent framework is put in place
 Ensure (i.e. prove positively) that your solution is independent of any
single biometric technology provider
 Maintain strict data independence from underlying device or matcher
technology
 Large scale programs can clearly benefit for performance analysis
tools to ensure optimum use of biometrics
 Deploying a system that leverages synergies between an identification
broker and analysis tools enables systems to be self optimizing over
time yielding better performance and mitigating against cyber security
threats
© Copyright Daon, 2009 25
Thank You – Questions?
Conor White
Email: conor.white@daon.com
Direct: 703 984 4010

Contenu connexe

Tendances

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric SystemsPiyush Mittal
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPTPavan Kumar MT
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - ReportNavin Kumar
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Niharika Gupta
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognitionMazin Alwaaly
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technologyiamsanjayk
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology Ketan Sawakare
 

Tendances (20)

Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Multimodal Biometric Systems
Multimodal Biometric SystemsMultimodal Biometric Systems
Multimodal Biometric Systems
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometric Authentication Technology - Report
Biometric Authentication Technology - ReportBiometric Authentication Technology - Report
Biometric Authentication Technology - Report
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
biometrics
biometricsbiometrics
biometrics
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometrics
BiometricsBiometrics
Biometrics
 
Pattern recognition 3d face recognition
Pattern recognition 3d face recognitionPattern recognition 3d face recognition
Pattern recognition 3d face recognition
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 

En vedette

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesPrabh Jeet
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
ISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security ManagementISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security ManagementPhil Griffin
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

En vedette (12)

Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Biometric Security advantages and disadvantages
Biometric Security advantages and disadvantagesBiometric Security advantages and disadvantages
Biometric Security advantages and disadvantages
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
ISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security ManagementISSA Web Conference - Biometric Information Security Management
ISSA Web Conference - Biometric Information Security Management
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similaire à Cyber Security Considerations for Biometric Systems

Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterpriseJason Bloomberg
 
Applied mobile chaos theory
Applied mobile chaos theoryApplied mobile chaos theory
Applied mobile chaos theorySecureITExperts
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeArnold Antoo
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesPrakhyath Rai
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdfDr. Shivashankar
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISSaazan Shrestha
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4Rodrigo Piovesana
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 

Similaire à Cyber Security Considerations for Biometric Systems (20)

Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Nonprofit IT Trends 2018
Nonprofit IT Trends 2018Nonprofit IT Trends 2018
Nonprofit IT Trends 2018
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
I0516064
I0516064I0516064
I0516064
 
Certes webinar securing the frictionless enterprise
Certes webinar   securing the frictionless enterpriseCertes webinar   securing the frictionless enterprise
Certes webinar securing the frictionless enterprise
 
Applied mobile chaos theory
Applied mobile chaos theoryApplied mobile chaos theory
Applied mobile chaos theory
 
Zero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital AgeZero Trust: Redefining Security in the Digital Age
Zero Trust: Redefining Security in the Digital Age
 
Ethics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging TechnologiesEthics, Professionalism and Other Emerging Technologies
Ethics, Professionalism and Other Emerging Technologies
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
The myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MISThe myth of secure computing; management information system; MIS
The myth of secure computing; management information system; MIS
 
U nit 4
U nit 4U nit 4
U nit 4
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 

Dernier

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Dernier (20)

4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 

Cyber Security Considerations for Biometric Systems

  • 1. © Copyright Daon, 2009 1 Biometrics and Cyber SecurityBiometrics and Cyber Security Key Considerations in Protecting CriticalKey Considerations in Protecting Critical InfrastructureInfrastructure –– Now and In The FutureNow and In The Future Conor White, Chief Technology Officer, Daon
  • 2. © Copyright Daon, 2009 2 Why is Cyber Security Important in the Context of Biometric Systems?
  • 3. © Copyright Daon, 2009 3 Cyber Security & Biometrics  On the Internet, nobody knows you are a dog…. Or a terrorist …Or a student … Or a spy…
  • 4. © Copyright Daon, 2009 4 Identity is More Valuable than Money! “I can’t think of a single piece of information more critical to our ultimate security and prosperity, both as individuals and as a country, than our personal identity. The ability of an individual to establish identity, to verify “you are who you claim to be”, is critical to the many transactions that occur in a single day. As the world becomes more interdependent, as transactions become more global, and as the world embraces identity management and assurance as an element of conducting business, personal identities will become a form of global currency. Whether you are crossing a border, seeking employment, applying for a public benefit, opening a bank account, combating crime, making a purchase, enforcing immigration policy, granting access to public and private spaces, detecting terrorists ---- identity verification has limitless value.” Governor Tom Ridge Former Secretary, Department of Homeland Security
  • 5. © Copyright Daon, 2009 5 Identity Management is Fundamental to Cyber Security  Cyber Security is about establishing trust in entities accessing your networks and ensuring that they perform functions consistent with the role you define for them.  The fundamental capability necessary for any cyber security solution is Identity Management. • Biometrics is a key enabling technology in the fight to strengthen the security of systems against cyber crime  However…
  • 6. © Copyright Daon, 2009 6 …Biometric Identity Systems Will Be Attacked!  In this session we will discuss (briefly) the following cyber security topics as they relate to Biometric Systems: 1. System Level Perspective 2. Person Level Perspective 3. Independence, Flexibility, Ongoing Analysis and Adaptation
  • 7. © Copyright Daon, 2009 7 Attacks on Biometric Systems Consider the following:  Don’t have to duplicate to spoof – you just need to alter to ensure no 1:1 or 1:N match (negative identification scenarios)  As our databases grow, we struggle to achieve universality  As we seek to automate, unattended acquisition and authentication creates risk  As more systems are deployed, frequency and sophistication of attacks will increase • Microsoft OS virus vs Apple OS virus  No Biometric modality is perfect – don’t believe anybody who tells you otherwise  No silver bullet - lots of papers & patents but few commercial offerings  Industry starting to look more seriously at liveness detection – e.g. LivDet 2009 Biometrics provide a clear benefit to counteracting cyber security threats – but biometric systems can themselves be a source of weakness
  • 8. © Copyright Daon, 2009 8 How Do We Compete?  Countermeasures are required: • Enhanced Capture Software • Secured Systems • New Capture Devices • Multi-factor • Multi-modal • Supervision & Oversight – guiding standard and principles • Ability to react through flexible technology and process  Biometric matching has been a technology- and tool-centric field.  A Defense-in-Depth method of dealing with biometric & identity-related concerns takes a more holistic approach: People Technology Operations
  • 9. © Copyright Daon, 2009 9 Biometric System Threats & Countermeasures
  • 10. © Copyright Daon, 2009 10 Biometric System Vulnerabilities Key Considerations: • There is no perfect identity authentication method – every form of authentication has vulnerabilities • The entire identity eco-system is vulnerable to attack • Don’t just secure the point of authentication • Consider systemic weaknesses as well • Must provide a defense-in-depth strategy Signal Processing Data Collection Matching Storage Decision Verifier 1 2 3 4 5 6 7 8 9 10 11 Person Perspective System Perspective Source: Study report on Biometrics and E-Authentication
  • 11. © Copyright Daon, 2009 11 First Principle of Cyber Security Security by Design  Security should be designed into a solution and not “bolted on” after the fact  All solutions MUST be designed using industry-best security principles • Encryption of data – both in transit and at rest • Use of strong cryptographic techniques (e.g. HSMs) • Robust key management • Non-repudiation of events • Authorization of function • Integrity protection – data and system • Uses industry proven techniques – no “security by obscurity” Biometrics systems are vulnerable to attack at several points in the process: data collection, signal processing, data storage, and decision/action point
  • 12. © Copyright Daon, 2009 12 Location Threats Example Countermeasures 1 – Data Collection Spoofing Liveness detection - Challenge/response Multi-modal, policy-based Device substitution Mutually authenticate device Vendor agnostic architecture 2 – Raw Data Transmission Replay attack Sign data, timestamp, session tokens/nonces, HSM, FIPS 3 – Signal Processing (Software) Component replacement Sign components 5 – Matching Manipulation of match scores Debugger hostile environment Hill climbing Coarse scoring, trusted sensor, secure channel, limit attempts 7 - Storage Database compromise (reading/replacing template, changing bindings) DB access controls, sign/encrypt templates, store on secure token Audit, digital signature 9 – Decision Threshold manipulation Protected function, data protection Signal Processing Data Collection Matching Storage Decision Verifier 1 2 3 4 5 6 7 8 9 10 11 Person Perspective System PerspectiveDefense in Depth So How do We Design in the Countermeasures?
  • 13. © Copyright Daon, 2009 13 And Don’t Forget about Data Security  Provide an authentication framework that • Securely manages sensitive biometric data. • Ensures the privacy of users’ personal (e.g. biometric) data. • Resists attacks launched by insiders/outsiders. • Provides for non-repudiation of activities. • Integrates with 3rd party applications. • Scales to enterprise-wide deployments. • Is biometric-agnostic by design.  Biometric data must be stored securely • Privacy concerns (legislation) • Risk of legal challenges to signatures if stolen  Assume a hostile network • Eavesdropping on sensitive traffic. • Injection/deletion of messages  Assume a hostile environment • Database may be compromised. • Machines may be physically attacked. • Attacks launched against OS or Daon software.
  • 14. © Copyright Daon, 2009 14 In Summary  Biometrics enable stronger defense against cyber security attacks but biometric systems need to ensure that they don’t become a platform for launching an attack themselves  Design Security In – Don’t just bolt it on • Protect biometric systems using a holistic approach • Ensure all data is encrypted (in motion and at rest) • Ensure robust key management and distribution • Signing of all parties in a transaction • Tamper evidence and integrity checks throughout system • Audit trails and non-repudiation • Consider all points in a solution and look for vulnerabilities  Its NOT just about the matching algorithm!
  • 15. © Copyright Daon, 2009 15 Person-Oriented Attacks & Countermeasures
  • 16. © Copyright Daon, 2009 16 Person Oriented Attacks  Historically the focus has been finger, face, and iris however, there are several modes being refined: vein, voice, iris on the move,….  To defeat a biometric system, sometimes it is sufficient to cause distortion (i.e. to not match). • Example, distortion of fingerprints to avoid watchlist hits  Universality/Inclusivity becomes a major issue for large populations  Multi-Modal solutions work best  Systems need an adaptive architecture that can incorporate these new modes and leverage technology improvements over time The most progressive, modern systems begin as a multi-biometric platform with built in systemic security & privacy safeguards and add different biometric capabilities as needed over time!
  • 17. © Copyright Daon, 2009 17 Multi-biometric Fusion  Use fusion to improve accuracy and robustness • Increase accuracy beyond single biometric matching • Reduce FTE (broaden population) • Spoof/denial resistance • Cope with poor quality data • Sensor/user fault tolerance  Fusion performance depends on: • Input data available • Comparison algorithm accuracy • Correlations between different matcher scores • Fusion technique • Training data
  • 18. © Copyright Daon, 2009 18 Multi-Biometric Fusion in Action  Choose a platform that enables multiple biometrics to ensure optimized performance  Multi-biometric systems provide key advantages: • Increased accuracy (noise reduction) • Enhanced Usability • Greater Universality • Improved Security • Improved performance (FMR, FNMR)  As enrollment populations grow dramatically, multi- modal solutions are inevitable. Performance of large scale identity programs can be significantly improved through the use of multiple biometrics. Large scale systems should establish a core multi-biometric platform first and then choose the most applicable algorithms to suit their population, commercial and performance needs 0.1000% 1.0000% 10.0000% 100.0000% 0.0001% 0.0010% 0.0100% 0.1000% 1.0000% 10.0000% 100.0000% False Match Rate (FMR) FalseNon-MatchRate(FNMR) Face Finger Sum fusion Product fusion
  • 19. © Copyright Daon, 2009 19 In Summary  There is NO perfect biometric type  There is NO perfect biometric device or algorithm  Biometric performance will continue to increase over time, costs will decrease  Spoofing attacks will continue and gain in frequency and complexity  A flexible framework is needed to counteract these attacks  Multi-biometric systems provide best defense – with ability to continually add new technology components  Policy based normalization and fusion should be kept independent of biometric matching algorithms  Adopt a platform that enables you to take advantage of technological improvements over time
  • 20. © Copyright Daon, 2009 20 Technology Flexibility, Ongoing Analysis and Adaptation
  • 21. © Copyright Daon, 2009 21 Analysis and Adaptation  Question: How do you react to: • Biometric technologies continuously changing • Weaknesses identified in specific algorithms or devices • Spoofing techniques continuously improving • New normalization and fusion techniques emerging • Throughput and performance models emerging • …  Answer: Deploy an analysis and adaptation engine that enables you to do “what-if analysis” and understand consequences of changes ahead of implementation  Identify and correct weak points ahead of cyber attackers  Automate performance analysis of what-if scenarios: • Algorithms: Matching, Quality, Fusion • Devices/sensors • Interoperability: Cross-device analysis, multi-algorithm scenarios • Protocols e.g. 1:1, 1:N, #attempts, preferred sample types
  • 22. © Copyright Daon, 2009 22 Which Fusion? DETs 1.0E-03 1.0E-02 1.0E-01 1.0E+00 1.0E-06 1.0E-05 1.0E-04 1.0E-03 1.0E-02 1.0E-01 1.0E+00 False Match Rate (FMR) FalseNon-MatchRate(FNMR) 517_Face_C 517_Finger_LI SUM: MinMax SUM: Zscore SUM: MAD SUM: TanH PROD: FNMR PROD: Liklihood
  • 23. © Copyright Daon, 2009 23 Self Optimizing Framework for Analysis and Adaptation Biometric Performance Analysis Engine Results Analysis Policy Based Biometric Platform Biometric Performance Analysis Engine
  • 24. © Copyright Daon, 2009 24 In Summary  Vendor independence provides both a monetary ROI and a cyber- threat risk mitigation  Leverage concept of master broker to orchestrate operations of biometric components  Ensure a vendor independent framework is put in place  Ensure (i.e. prove positively) that your solution is independent of any single biometric technology provider  Maintain strict data independence from underlying device or matcher technology  Large scale programs can clearly benefit for performance analysis tools to ensure optimum use of biometrics  Deploying a system that leverages synergies between an identification broker and analysis tools enables systems to be self optimizing over time yielding better performance and mitigating against cyber security threats
  • 25. © Copyright Daon, 2009 25 Thank You – Questions? Conor White Email: conor.white@daon.com Direct: 703 984 4010