Biometrics: Not a Panacea

By Morey Haber

Morey Haber serves as the VP of Technology for BeyondTrust. With more than 20 years of IT industry experience, Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004,  Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators.

Last fall brought news that the victims of the OPM fingerprint breach expanded to over five million prints. It’s for this reason that the safety of biometric data should be questioned and discounted as a viable means for authentication. Multiple techniques are available for using this type of information to create fake fingerprints to bypass biometric scanners, plant false fingerprints, or even falsify applications that need fingerprint data using traditional ink techniques. While vendors gather around biometrics as a holy grail for authentication, it is breaches like this that put the entire concept of biometrics-based security in jeopardy for the masses. Therefore, what is needed to solve this problem is a clear definition of when biometrics should be used for authorization, authentication, and to support two-factor authentication. While these may sound like similar terms, in reality, biometrics should only be used for authorization and never authentication alone.

Authorization, in the simplest terms, is the permission to perform a task. It is the ability to proceed without verifying who you are, or who you say you are. The most common form of biometric authorization used today is Apple Pay. When placing your finger on the touch identification sensor, you are authorizing payment. It is just a permission. Authentication, however, is the verification of you as a person, and who you say you are. It does not authorize you to perform any tasks; it just proves your identity. Authentication is primarily performed today by usernames and passwords, two-factor authentication, smart cards, and other techniques like one-time-passwords. They generally tie secret knowledge to a second physical media or to the creation of a unique code that only you have knowledge of.  The various components of an authentication system are designed to prove your identity, but they do not authorize you as a person to anything.

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+

Categorized as:Cyber Tech/CyberTagged with:

Related Articles

Search

Close