Authors :
Rajesh Kumar
Volume/Issue :
Volume 9 - 2024, Issue 7 - July
Google Scholar :
https://tinyurl.com/3mbd6pxt
Scribd :
https://tinyurl.com/3ps4hz7f
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUL541
Abstract :
Passwords and other old authentication
mechanisms are becoming less secure as cybersecurity
threats continue to change. By utilizing distinctive
physical or behavioral characteristics to confirm the
identification of anyone gaining access to sensitive data
or systems, biometric authentication is a viable
alternative (Bhattacharyya, Ranjan, Alisherov, & Choi,
2009). The purpose of this article is to investigate how
biometric authentication might improve cybersecurity. It
emphasizes the benefits of biometrics, such as their
better user experience, multi-factor authentication
capabilities, and uniqueness and non-replicability
(Bhattacharyya, Ranjan, Alisherov, & Choi, 2009).
Concerns and restrictions, including possible
vulnerabilities and privacy issues, are also covered in the
article. It also covers important factors to consider while
implementing biometric authentication, such as safe
processing and storage of biometric data
(Bhattacharyya, Ranjan, Alisherov, & Choi, 2009).
Biometrics are essential for bolstering cybersecurity and
reducing the dangers connected with password-related
issues since they offer a dependable and secure means of
user verification.
All things considered, biometric authentication
provides a reliable and practical way to confirm user
identities, strengthening an organization's security
posture and shielding confidential data from unwanted
access.
Keywords :
Password, Authentication Mechanisms, Cyber Security Threats, Biometric Authentication, Vulnerability.
References :
- Bhattacharyya, D., Ranjan, R., Alisherov, F., & Choi, M. (2009). Biometric authentication: A review. International Journal of u-and e-Service, Science and Technology, 2(3), 13-28.
- Weaver, A. C. (2006). Biometric authentication. Computer, 39(2), 96-97.
- Gayathri, M., Malathy, C., & Prabhakaran, M. (2020). A review of various biometric techniques, their features, methods, security issues and application areas. Computational Vision and Bio-Inspired Computing: ICCVBIC 2019, 931-941.
- Li, L., Mu, X., Li, S., & Peng, H. (2020). A review of face recognition technology. IEEE access, 8, 139110-139120.
- Patel, C. D., Trivedi, S., & Patel, S. (2012). Biometrics in IRIS technology: A survey. International Journal of Scientific and Research Publications, 2(1), 1-5.
- Boreki, G., & Zimmer, A. (2005, October). Hand geometry: a new approach for feature extraction. In Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05) (pp. 149-154). IEEE.
- Alsaadi, I. M. (2021). Study on most popular behavioral biometrics, advantages, disadvantages, and recent applications: A review. Int. J. Sci. Technol. Res, 10(1).
- Dharavath, K., Talukdar, F. A., & Laskar, R. H. (2013, December). Study on biometric authentication systems, challenges, and future trends: A review. In 2013 IEEE international conference on computational intelligence and computing research (pp. 1-7). IEEE.
- Wayman, J. L., Jain, A. K., Maltoni, D., & Maio, D. (Eds.). (2005). Biometric systems: Technology, design, and performance evaluation. Springer Science & Business Media.
- Pooe, A., & Labuschagne, L. (2011). Factors impacting on the adoption of biometric technology by South African banks: An empirical investigation. Southern African Business Review, 15(1).
- Starlink, & Starlink. (2023, November 7). Biometric Face Recognition System: Benefits, Uses, & How does it Work? - StarLink India. StarLink India -. https://www.starlinkindia.com/blog/biometrics-face-recognition/
- Vks, S. A. (n.d.). An introduction to retinal scanning and iris scanning. https://www.divilabs.com/2013/04/ an-introduction-to-retinal-scanning-and.html
Passwords and other old authentication
mechanisms are becoming less secure as cybersecurity
threats continue to change. By utilizing distinctive
physical or behavioral characteristics to confirm the
identification of anyone gaining access to sensitive data
or systems, biometric authentication is a viable
alternative (Bhattacharyya, Ranjan, Alisherov, & Choi,
2009). The purpose of this article is to investigate how
biometric authentication might improve cybersecurity. It
emphasizes the benefits of biometrics, such as their
better user experience, multi-factor authentication
capabilities, and uniqueness and non-replicability
(Bhattacharyya, Ranjan, Alisherov, & Choi, 2009).
Concerns and restrictions, including possible
vulnerabilities and privacy issues, are also covered in the
article. It also covers important factors to consider while
implementing biometric authentication, such as safe
processing and storage of biometric data
(Bhattacharyya, Ranjan, Alisherov, & Choi, 2009).
Biometrics are essential for bolstering cybersecurity and
reducing the dangers connected with password-related
issues since they offer a dependable and secure means of
user verification.
All things considered, biometric authentication
provides a reliable and practical way to confirm user
identities, strengthening an organization's security
posture and shielding confidential data from unwanted
access.
Keywords :
Password, Authentication Mechanisms, Cyber Security Threats, Biometric Authentication, Vulnerability.