From the editor's desk: The good, the bad and the biometric

Access & Identity Management Handbook 2015 News & Events

It’s always interesting to look back at the process of developing the Access & Identity Management Handbook and see what really has changed over the course of a year. Sometimes we find that the excitement around a new technology or solution has failed to play out as expected and it is simply another option the market can choose a year later.

Biometrics is a good example. We have been hearing about the potential and security of biometrics for many years, backed by a good growth rate both in South Africa and the world. This year is no different as we are seeing the biometric vendors looking excitedly ahead at future growth as this form of identity authentication becomes part of the general user’s everyday experience – and mobile technology is responsible for much of that as is the computer industry as we are already seeing more laptops with fingerprint authentication built in.

Readers will even see some comments in this issue about the Internet of Things (IoT). There is no doubt that the IoT is going to be a major part of our lives in future, although the first bits of it are already here and we’re using it without giving it a cool name. If you control a camera or your lights at home, you’re already using the Internet of Things.

Biometrics vendors see the IoT as a great opportunity since when everything is connected, accurately authenticating users becomes so much more important. The argument is that your biometrics is the optimal way to verify yourself. The problem is that the cheapies will probably gain a stronger foothold than quality biometric products. The cost factor always wins.

We’ve already seen mobile biometric technologies being ‘cracked’ in no time because the systems used are old and more cost effective. The same applies to laptops. The fact is cost will play a huge role in the IoT and most people see a fingerprint scanner as a fingerprint scanner, they have no idea there is a world of difference in how the data collected is used.

In a recent paper it was disclosed that some mobile biometric readers don’t store the user’s information in a secure location, among three other critical and common vulnerabilities. The paper is worth a read and is available at https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Fingerprints-On-Mobile-Devices-Abusing-And-Leaking-wp.pdf (short URL: https://goo.gl/qBXS5J).

In the world of biometrics, as in any other security field, it’s not enough to have one strong authentication mechanism on top of a host of vulnerabilities. In other words, it doesn’t matter how strong the lock on the door is if you leave the windows open. Which again leads us to the issue of integration.

Integration, whether it’s connecting your alarm at home to your smartphone or connecting everything via the IoT, is not simply connecting things together, it’s a matter of connecting things together securely. And in that there are enormous opportunities for the security industry, as well as enormous challenges.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Onyyx wireless alarm
Technews Publishing Editor's Choice Smart Home Automation
IDS has introduced Onyyx, a wireless alarm system engineered to provide complete system control via the Onyyx app or keyring, as well as seamless installation.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
From the editor's desk: Keeping them out, keeping you aware
News & Events
Alarm, intrusion, and perimeter protection have been part and parcel of South African society for years. Many years ago, a home alarm consisted of wires covering one’s windows, which caused an alarm ...

Read more...
Intrusion Selection Guide 2024
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Intrusion Selection Guide 2024 includes the latest products and solutions aimed at small, medium, and large operations that require reliable, easy-to-install, set-up, and use intruder detection technology that reduces false alarms but never misses an actual event.

Read more...
Perimeter Selection Guide
Technews Publishing Perimeter Security, Alarms & Intruder Detection
The Perimeter Selection Guide 2024 includes the latest products, solutions, and management platforms for small, medium, and large operations that require reliable, durable, and integrated perimeter security solutions.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...
A critical component of perimeter security
Nemtek Electric Fencing Products Gallagher Technews Publishing Stafix Editor's Choice Perimeter Security, Alarms & Intruder Detection Integrated Solutions
Electric fences are standard in South Africa, but today, they also need to be able to integrate with other technologies and become part of a broader perimeter security solution.

Read more...
SMARTpod talks to The Risk Management Forum
SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Videos Training & Education
SMART Security Solutions recently released its first SMARTpod podcast, discussing the upcoming Risk Management Forum Conference 2024, which will be held on 26 September 2024 at the Indaba Conference Centre in Fourways, Johannesburg.

Read more...