Share to: share facebook share twitter share wa share telegram print page

Identity-based security

Identity-based security is a type of security that focuses on access to digital information or services based on the authenticated identity of an entity.[1] It ensures that the users and services of these digital resources are entitled to what they receive. The most common form of identity-based security involves the login of an account with a username and password. However, recent technology has evolved into fingerprinting or facial recognition.[2]

While most forms of identity-based security are secure and reliable, none of them are perfect and each contains its own flaws and issues.[3]

History

The earliest forms of Identity-based security was introduced in the 1960s by computer scientist Fernando Corbató.[4] During this time, Corbató invented computer passwords to prevent users from going through other people's files, a problem evident in his Compatible Time-Sharing System (C.T.S.S.), which allowed multiple users access to a computer concurrently.[5] Fingerprinting however, although not digital when first introduced, dates back even further to the 2nd and 3rd century, with King Hammurabi sealing contracts through his fingerprints in ancient Babylon.[6] Evidence of fingerprinting was also discovered in ancient China as a method of identification in official courts and documents. It was then introduced in the U.S. during the early 20th century through prison systems as a method of identification.[7] On the other hand, facial recognition was developed in the 1960s, funded by American intelligence agencies and the military.[8]

Types of identity-based security

Account Login

The most common form of Identity-based security is password authentication involving the login of an online account. Most of the largest digital corporations rely on this form of security, such as Facebook, Google, and Amazon. Account logins are easy to register, difficult to compromise, and offer a simple solution to identity-based digital services.

Fingerprint

Fingerprint biometric authentication is another type of identity-based security. It is considered to be one of the most secure forms of identification due to its reliability and accessibility, in addition to it being extremely hard to fake. Fingerprints are also unique for every person, lasting a lifetime without significant change. Currently, fingerprint biometric authentication are most commonly used in police stations, security industries, as well as smart-phones.

Facial Recognition

Facial recognition operates by first capturing an image of the face. Then, a computer algorithm determines the distinctiveness of the face, including but not limited to eye location, shape of chin, or distance from the nose. The algorithm then converts this information into a database, with each set of data having enough detail to distinguish one face from another.[9]

Controversies and issues

Account Login

A problem of this form of security is the tendency for consumers to forget their passwords. On average, an individual is registered to 25 online accounts requiring a password, and most individuals vary passwords for each account.[10] According to a study by Mastercard and the University of Oxford, "about a third of online purchases are abandoned at checkout because consumers cannot remember their passwords."[11] If the consumer does forget their password, they will usually have to request a password reset sent to their linked email account, further delaying the purchasing process. According to an article published by Phys Org, 18.75% of consumers abandon checkout due to password reset issues.[12]

When individuals set a uniform password across all online platforms, this makes the login process much simpler and hard to forget. However, by doing so, it introduces another issue where a security breach in one account will lead to similar breaches in all remaining accounts, jeopardizing their online security.[13] This makes the solution to remembering all passwords much harder to achieve.[citation needed]

Fingerprint

While fingerprinting is generally considered to be secure and reliable, the physical condition of one's finger during the scan can drastically affect its results. For example, physical injuries, differing displacement, and skin conditions can all lead to faulty and unreliable biometric information that may deny one's authorization.[citation needed]

Another issue with fingerprinting is known as the biometric sensor attack. In such an attack, a fake finger or a print of the finger is used in replacement to fool the sensors and grant authentication to unauthorized personnel.[14]

Facial Recognition

Facial recognition relies on the face of an individual to identify and grant access to products, services, or information. However, it can be fraudulent due to limitations in technology (lighting, image resolution) as well as changes in facial structures over time.

There are two types of failure for facial recognition tests.[15] The first is a false positive, where the database matches the image with a data set but not the data set of the actual user's image. The other type of failure is a false negative, where the database fails to recognize the face of the correct user. Both types of failure have trade-offs with accessibility and security, which make the percentage of each type of error significant. For instance, a facial recognition on a smart-phone would much rather have instances of false negatives rather than false positives since it is more optimal for you to take several tries logging in rather than randomly granting a stranger access to your phone.

While in ideal conditions with perfect lighting, positioning, and camera placement, facial recognition technology can be as accurate as 99.97%. However, such conditions are extremely rare and therefore unrealistic. In a study conducted by the National Institute of Standards and Technology (NIST), video-recorded facial recognition accuracy ranged from 94.4% to 36% depending on camera placement as well as the nature of the setting.[16]

Aside from the technical deficiencies of Facial Recognition, racial bias has also emerged as a controversial subject. A federal study in 2019 concluded that facial recognition systems falsely identified Black and Asian faces 10 to 100 times more often than White faces.[17]

See also

References

  1. ^ "identity-based access control - Glossary | CSRC". csrc.nist.gov. Retrieved 2020-11-27.
  2. ^ Dastbaz, Mohammad; Halpin, Edward; Wright, Steve (2013). "Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities". Strategic Intelligence Management. pp. 108–118. doi:10.1016/B978-0-12-407191-9.00010-7. ISBN 9780124071919.
  3. ^ Pot, Justin (14 February 2018). "Perfect Computer Security Is a Myth. But It's Still Important". How-To Geek. Retrieved 2020-12-06.
  4. ^ "Computer password inventor dies aged 93". BBC News. 2019-07-15. Retrieved 2020-11-20.
  5. ^ Yang, Yi; Yeo, Kheng Cher; Azam, Sami; Karim, Asif; Ahammad, Ronju; Mahmud, Rakib (2020). "Empirical Study of Password Strength Meter Design". 2020 5th International Conference on Communication and Electronics Systems (ICCES). pp. 436–442. doi:10.1109/ICCES48766.2020.9137964. ISBN 978-1-7281-5371-1. S2CID 220568597.
  6. ^ "The History of Fingerprinting". Crime+Investigation UK. 2018-05-06. Retrieved 2020-11-20.
  7. ^ "History of Fingerprints". www.crimescene-forensics.com. Retrieved 2020-12-06.
  8. ^ "Facial Recognition". Bloomberg.com. 2019-05-23. Retrieved 2020-11-20.
  9. ^ Sample, Ian (2019-07-29). "What is facial recognition - and how sinister is it?". The Guardian. ISSN 0261-3077. Retrieved 2020-12-06.
  10. ^ Yıldırım, M.; Mackie, I. (1 December 2019). "Encouraging users to improve password security and memorability". International Journal of Information Security. 18 (6): 741–759. doi:10.1007/s10207-019-00429-y. S2CID 108292833.
  11. ^ Johnson, Tim (June 16, 2017). "Forgot your password? You have too many and stores are losing business over it". Impact 2020.
  12. ^ "When customers forget their passwords, business suffers". phys.org. Retrieved 2020-10-29.
  13. ^ Schroers, Jessica (4 May 2019). "I have a Facebook account, therefore I am – authentication with social networks". International Review of Law, Computers & Technology. 33 (2): 211–223. doi:10.1080/13600869.2018.1475895. S2CID 65110549.
  14. ^ Ali, Media Abdul Razak (2011). "Design of an Online authentication protocol using both fingerprint identification and identity based cryptography". Al-Nahrain Journal for Engineering Sciences. 14 (2): 199–204.
  15. ^ "Face Recognition". Electronic Frontier Foundation. 2017-10-24. Retrieved 2020-12-06.
  16. ^ "How Accurate are Facial Recognition Systems – and Why Does It Matter?". www.csis.org. Retrieved 2020-12-06.
  17. ^ "Despite past denials, LAPD has used facial recognition software 30,000 times in last decade, records show". Los Angeles Times. 2020-09-21. Retrieved 2020-12-06.

Read other articles:

Deputi Bidang Koordinasi Pariwisata dan Ekonomi Kreatif (Deputi V Kemenko Marves) merupakan unsur pelaksana pada Kementerian Koordinator Bidang Kemaritiman Republik Indonesia yang berada di bawah dan bertanggung jawab kepada Menteri Koordinator Bidang Kemaritiman dan Investasi. Deputi ini terbentuk berdasarkan Peraturan Presiden Nomor 92 Tahun 2019 tentang Kementerian Koordinator Bidang Kemaritiman dan Investasi. Deputi Bidang Koordinasi Koordinasi Pariwisata dan Ekonomi Kreatif mempunyai tugas …

Artikel ini sudah memiliki referensi, tetapi tidak disertai kutipan yang cukup. Anda dapat membantu mengembangkan artikel ini dengan menambahkan lebih banyak kutipan pada teks artikel. (Juli 2013) (Pelajari cara dan kapan saatnya untuk menghapus pesan templat ini) 6,5 × 50 mm SR Arisaka 6,5 × 50 mm SR Arisaka (tengah) dengan .303 British (kiri) dan .30-06 Springfield (kanan). Tipe Senapan Negara asal Kekaisaran Jepang Sejarah penggunaan Digunakan oleh Kekaisaran Jepang, Kekaisar…

1956 American epic Western drama film For the Off-Broadway musical, see Giant (musical). GiantTheatrical release poster by Bill GoldDirected byGeorge StevensScreenplay by Fred Guiol Ivan Moffat Based onGiant1952 novelby Edna FerberProduced by George Stevens Henry Ginsberg Starring Elizabeth Taylor Rock Hudson James Dean Carroll Baker Jane Withers Chill Wills Mercedes McCambridge Sal Mineo Dennis Hopper Elsa Cárdenas Earl Holliman CinematographyWilliam C. MellorEdited by William Hornbeck Philip …

Dragon Ball Z: The History of Trunks, di kenal di Jepang sebagai Defiance in the Face of Despair!! The Remaining Super-Warriors: Gohan and Trunks (ドラゴンボールZ 絶望への反抗!!残された超戦士・悟飯とトランクス Doragon Bōru Zetto Zetsubō e no Hankō!! Nokosareta Chō-Senshi•Gohan to Torankusu?), adalah sebuah TV spesial berdasarkan pada seri manga Dragon Ball. Pertama kali mengudara di Jepang pada 24 februari 1993 antara episode 175 dan 176, cerita spesial ini ber…

Post-Roman European social class The Nobel Prize-winning author Thomas Mann belonged to a Hanseatic patrician family (the Mann family) and portrayed the patriciate in his 1901 novel Buddenbrooks.[1][2] The German banker Johann Hinrich Gossler married Hamburg patrician heiress Elisabeth Berenberg, and became owner of Berenberg Bank. His descendants reached the highest positions in the aristocratic republic, including as senators and head of state. Patricianship, the quality of bel…

Pour les articles homonymes, voir Ćorović. Vladimir ĆorovićVladimir ĆorovićFonctionsProfesseur au département d'histoire de l'université de BelgradeBiographieNaissance 27 octobre 1885Mostar, Condominium de Bosnie-HerzégovineDécès 17 avril 1941 (à 55 ans)Près d'Elassóna, GrèceNom dans la langue maternelle Владимир ЋоровићNationalité Yougoslave et serbeFormation Université de VienneActivité Historien, écrivain, philologueFratrie Svetozar ĆorovićConjoint Jel…

Ankara University Faculty of Veterinary MedicineTypeFaculty of a public research universityEstablished1842DeanEnder YarsanLocationDışkapı, Ankara, Turkey39°57′27.0238″N 32°51′43.9153″E / 39.957506611°N 32.862198694°E / 39.957506611; 32.862198694ColorsClaret & WhiteWebsitewww.veterinary.ankara.edu.tr/en/mainpage/ The Faculty of Veterinary Medicine at the Ankara University is a school of veterinary medicine in Ankara.[1] Until 1970, it was the onl…

Swedish writer Peder Sjögren (1905–1966), born as Gösta Sjögren, was a Swedish writer who fought in the Spanish Civil War and the Continuation War. Many of his books were based on those experiences. Life and works Peder Sjögren Gösta Tage Filip Sjögren was born in 1905, outside Växjö, in the province of Småland, and at the age of 10 moved to Stockholm. Aged 17, he was sent to Rome, after which he travelled to the Balkans, Spain, North Africa, Poland and Finland.[1] As an antif…

AnkhkheperureSmenkhkare Djeser KheperuFiraunMasa pemerintahan1335–1334 SM (Dinasti kedelapan belas Mesir)KoregensiAkhenatenPendahuluAkhenatenPenggantiNeferneferuatenGelar kerajaan Prenomen  (Praenomen) Ankhkheperure Hidup adalah manifestasi Re[1] Nomen Smenkhkare-DjeserkheperuYang sangat kuat adalah Jiwa Re, Bentuk Kudus[1] PasanganMeritatenMeninggal1334 SM Peti mati kerajaan yang tercemar ditemukan di Makam KV55 Tengkorak mumi KV55, yang diyakini Smenkhkare. Ankhkheperure…

Angkatan Bersenjata Republik IndonesiaLambang ABRIBendera ABRIDidirikan5 Oktober 1959(sebelumnya bernama Angkatan Perang Republik Indonesia)Dibubarkan18 Agustus 2000(dipisahkan menjadi Tentara Nasional Indonesia dan Kepolisian Negara Republik Indonesia)Angkatan Angkatan Darat Angkatan Laut Angkatan Udara Angkatan KepolisianMarkas besarJakartaIndustriPemasok lokalPindadPemasok asing Uni Soviet Amerika Serikat Jerman Barat Israel Britania Raya Jerman Timur Austra…

American baseball player Baseball player Luke HeimlichHeimlich with Oregon State in 2015Free agent PitcherBorn: (1996-02-03) February 3, 1996 (age 28)Puyallup, Washington, U.S.Bats: LeftThrows: Left Career highlights and awards National Pitcher of the Year Award (2018) Luke Andrew Heimlich (born February 3, 1996) is an American baseball pitcher who is a free agent. He attended Oregon State University and played college baseball for the Oregon State Beavers. He was named the Collegiate Pitch…

Cet article est une ébauche concernant un acteur américain. Vous pouvez partager vos connaissances en l’améliorant (comment ?) selon les conventions filmographiques. Edgar Buchanan Edgar Buchanan en 1971. Données clés Nom de naissance William Edgar Buchanan Naissance 20 mars 1903HumansvilleMissouri, États-Unis Nationalité Américaine Décès 4 avril 1979 (à 76 ans)Palm Desert (Californie, États-Unis) Profession Acteur Films notables L'Aigle des mers (1940) La Porte du diable…

Cet article est une ébauche concernant un compositeur italien, un compositeur de musique de film et un musicien italien. Vous pouvez partager vos connaissances en l’améliorant (comment ?). Pour plus d’informations, voyez le projet musique classique. Consultez la liste des tâches à accomplir en page de discussion. Fiorenzo CarpiFiorenzo CarpiBiographieNaissance 19 octobre 1918MilanDécès 21 mai 1997 (à 78 ans)RomeSépulture Cimetière monumental de MilanNom de naissance Fioren…

Cathedral City in the West Midlands, England This article is about the city in England. For other uses, see Coventry (disambiguation). City and metropolitan borough in EnglandCoventryCity and metropolitan boroughUpper: Coventry city centre skylineMiddle: Coventry Cathedral; Whittle ArchLower: Coventry Council House; Coventry Transport MuseumBottom: Spon Street; The Precinct FlagCoat of armsShown within the West Midlands countyCoventryLocation within EnglandShow map of EnglandCoventryLocation wit…

1894 trial of anarchists in Paris Part of a series onAnarchism History Outline Schools of thought Feminist Green Primitivist Social ecology Total liberation Individualist Egoist Free-market Naturist Philosophical Mutualism Postcolonial African Black Queer Religious Christian Jewish Social Collectivist Parecon Communist Magonism Without adjectives Methodology Agorism Illegalism Insurrectionary Communization Expropriative Pacifist Platformism Especifismo Relationship Syndicalist Synthesis Theory P…

American comic book publisher This article is about the US publisher of comics. For the Scottish publisher of comics and newspapers, see DC Thomson. DC Comics, Inc.DC Comics' current logo, introduced with the DC Rebirth relaunch in 2016Parent companyDC EntertainmentStatusActiveFounded 1935; 89 years ago (1935)[1][2][3] (as National Comics Publications) 1961; 63 years ago (1961) (as National Periodical Publications) 1977; 47 …

Questa voce sull'argomento premi letterari è solo un abbozzo. Contribuisci a migliorarla secondo le convenzioni di Wikipedia. Lambda Literary AwardRiconoscimento assegnato alle migliori opere di argomento LGBT Assegnato daLambda Literary Foundation Paese Stati Uniti Anno inizio1988 Sito webwww.lambdaliterary.org/awards Modifica dati su Wikidata · Manuale I Lambda Literary Award, noti anche come Lammys[1], sono una serie di riconoscimenti letterari che celebrano annualmen…

拉米兹·阿利雅Ramiz Alia第1任阿尔巴尼亚總統任期1991年4月30日—1992年4月9日继任萨利·贝里沙阿尔巴尼亚人民议会主席团主席任期1982年11月22日—1991年4月30日前任哈奇·列希继任转任总统阿尔巴尼亚劳动党第一书记任期1985年4月13日—1991年5月4日前任恩维尔·霍查继任无(政党解散) 个人资料出生(1925-10-18)1925年10月18日 阿尔巴尼亚斯库台逝世2011年10月17日(2011歲—10—17)(85歲)…

German botanist of the 19th century August Heinrich Rudolf GrisebachBorn(1814-04-17)17 April 1814Hanover, Electorate of Hanover, Holy Roman EmpireDied9 May 1879(1879-05-09) (aged 65)Göttingen, Province of Hanover, Kingdom of PrussiaScientific careerAuthor abbrev. (botany)Griseb. August Heinrich Rudolf Grisebach (pronounced [ˈaʊɡʊst ˈhaɪnʁɪç ˈʁuːdɔlf ˈɡʁiːzəbax]; 17 April 1814 – 9 May 1879) was a German botanist and phytogeographer. Biography Gr…

Horizontal entrance shaft to an underground mine For the ADIT, see Advanced Diploma in International Taxation. For the Indonesian animated series, see Adit Sopo Jarwo. Gated entrance of an abandoned adit near Medford, Oregon, United States Look up adit in Wiktionary, the free dictionary. An adit (from Latin aditus, entrance)[1] or stulm[2] is a horizontal or nearly horizontal passage to an underground mine.[3] Miners can use adits for access, drainage,[4] ventilat…

Kembali kehalaman sebelumnya