Debunking Some Myths About Biometric Authentication

Biometric authentication systems are presented as the best way to reach high security levels in controlling access to IT systems or sensitive infrastructures. But several issues are often not taken properly into account. In order for the implementation of those systems to be successful, the hidden risks and the related liabilities have to be carefully analyzed before biometrics can be used on a large scale for sensitive applications. Access control to Information Technology (IT) systems or to sensitive infrastructure is a basic tool of security management, keeping the bad guys away from vital data, bank accounts or top-secret military projects.

Provided by: Cornell University Topic: Security Date Added: Mar 2012 Format: PDF

Find By Topic