Debunking Some Myths About Biometric Authentication

Free registration required

Executive Summary

Biometric authentication systems are presented as the best way to reach high security levels in controlling access to IT systems or sensitive infrastructures. But several issues are often not taken properly into account. In order for the implementation of those systems to be successful, the hidden risks and the related liabilities have to be carefully analyzed before biometrics can be used on a large scale for sensitive applications. Access control to Information Technology (IT) systems or to sensitive infrastructure is a basic tool of security management, keeping the bad guys away from vital data, bank accounts or top-secret military projects.

  • Format: PDF
  • Size: 146.27 KB