Monday, September 25, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Internet Of Things

Alternatives to facial recognition authentication

Researcher by Researcher
August 20, 2022
in Internet Of Things
0
Alternatives to facial recognition authentication
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Learn the problem with facial recognition as well as software and hardware alternatives to the technology.

Authentication by facial recognition. Biometric security system
Image: zephyr_p/Adobe Stock

The recent shift to remote work has created a sizable dilemma for IT departments responsible for security. With work computers and users now scattered all across the country, it creates problems that simply didn’t exist when workers were mostly confined to a centralized office.

At the core of this problem is the need for authentication across devices that provide adequate security but also are non-intrusive and easy for users to use regularly.

Many companies have considered facial recognition technology to authenticate users and access. But recent trends show facial recognition falling out of favor with many employees.

SEE: Artificial Intelligence Ethics Policy (TechRepublic Premium)

We’ll look at why companies are concerned about facial recognition as well as some alternatives that are both secure and friendly towards employees’ concerns.

The problem with facial recognition

Facial recognition started as a seemingly superb way to authentic user access to sensitive data. It required very little effort on the part of users, and for the most part, it was considered secure.

More recently, employees are finding facial recognition to be intrusive. With concerns about how such highly personal biometric data is both stored and shared, it has caused employees to ask whether the trade-offs benefit them.

 

Must-read security coverage

There are also concerns with reliability. When users are incorrectly locked out, they often have no recourse to resolve the situation on their own via various reset methods. This creates burdens for IT departments which must now deal with these issues.

Alternatives to facial recognition

The most common alternative to facial recognition would be two-factor authentication using an app such as Authy or Google Authenticator. This approach removes the need for any biometric data as the only forms of authentication needed are a password and a token provided by the 2FA app.

Many 2FA options can be combined with single sign-on technology to make it much easier for users as they move across different access points within a network.

Software solutions like Duo from Cisco can be used so users only need to authenticate one time as they move between platforms or even devices. Duo integrates SSO and 2FA to streamline authentication, and many corporations such as Etsy, Eventbrite and more are currently implementing this technology.

This approach can also be more secure than the single authentication method that facial recognition provides. Another benefit is that users have some control over recovering their own passwords or authenticator apps should there be a problem. This can lessen the burden on IT departments that would otherwise need to handle these tasks.

For higher security and flexibility, multi-factor authentication solutions are an alternative to facial recognition as well. With MFA software solutions like Okta, customized policies can be made for users to choose two or more authentication methods out of several. This allows for varied authentication methods that also include biometrics such as facial recognition if desired.

For some companies which have already implemented facial recognition or have compliance requirements that include facial recognition, this approach allows them to still meet those while allowing other users less stringent access.

Overall, MFA solutions allow for customized authentication options that fit almost any situation while remaining incredibly secure.

Hardware alternatives for authentication

Hardware authentication can provide the speed and ease of use of facial recognition but without the privacy issues surrounding biometric data storage.

A device such as a YubiKey provides one-touch authentication across devices and platforms without the need for tokens to be entered by the user, such as with Authy or Google Authenticator. However, YubiKey does offer the ability to enter tokens or one-time passcodes so that it can still be compliant with most legacy systems.

YubiKey also uses the FIDO 2 protocol, which allows for completely passwordless logins using public key cryptography. This gives it the same user freedom as facial recognition where no password needs to be remembered, but in a less intrusive way.

The drawback here is that it does require the small physical YubiKey itself. However, users can have spare or backup YubiKeys that can easily be retrieved or activated on their own without the intervention of IT staff.

Once again, this allows users to often remedy their own issues, similar to a password reset, something facial recognition often lacks.

Other biometric options

Sometimes biometric authentication is still preferred or even required to maintain compliance with certain policies or vendors. This has caused some companies to look for alternatives that are less intrusive than facial recognition.

One of these start-ups is called Typing DNA. While still a very new technology, it looks to use the individual typing patterns of users to perform continuous authentication.

The company refers to this technology as “typing biometrics” and it detects micro-patterns in how users type. This software only looks at the pattern of the typing, and the software does not actually read or monitor what is being typed. These micro-patterns then form a biometric fingerprint for that user. If the patterns change, the system is locked until various authentication methods are met.

The continuous authentication aspect of this sort of biometric system is what sets it apart. Most authentication options are one-time events. Devices left unattended can still be targeted. Typing DNA addresses that by being able to distinguish different users accessing a device, then lock them out.

It’s an interesting concept and shows that other less intrusive biometric authentication is possible with a little creativity, and some of these may displace things such as facial or fingerprint biometrics for some applications.



Source link

Related articles

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

September 21, 2023
Old routers reveal corporate secrets

Old routers reveal corporate secrets

September 16, 2023
Tags: alternativesAuthenticationFacialrecognition
Share76Tweet47

Related Posts

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

Intel Reveals New 288-Core Sierra Forest CPU, Core Ultra Processors at Intel Innovation 2023

September 21, 2023
0

Plus, Intel makes progress on its plan to revolutionize manufacturing with the 18A process node slated for 2024. Intel Core...

Old routers reveal corporate secrets

Old routers reveal corporate secrets

September 16, 2023
0

ESET Research When decommissioning their old hardware, many companies 'throw the baby out with the bathwater' 18 Apr 2023  • ...

Will you give X your biometric data? – Week in security with Tony Anscombe

What was hot at RSA Conference 2023? – Week in security with Tony Anscombe

September 16, 2023
0

Video The importance of understanding – and prioritizing – the privacy and security implications of large language models like ChatGPT...

Will you give X your biometric data? – Week in security with Tony Anscombe

Key findings from ESET’s new APT Activity Report – Week in security with Tony Anscombe

September 16, 2023
0

Video What have some of the world's most infamous advanced threat actors been up to and what might be the...

5 free OSINT tools for social media research

5 free OSINT tools for social media research

September 16, 2023
0

Social Media A roundup of some of the handiest tools for the collection and analysis of publicly available data from...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
Microsoft to Block Macros by Default in Office Apps

Qakbot Email Thread Hijacking Attacks Drop Multiple Payloads

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023
Will you give X your biometric data? – Week in security with Tony Anscombe

ESET’s cutting-edge threat research at LABScon – Week in security with Tony Anscombe

September 23, 2023

Recent Posts

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

‘Horse Gone Barn Bolted’ is Strong Password – Krebs on Security

September 23, 2023
SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

SumUp Launches 7am Payouts; Offering UK Merchants Optimal Financial Flexibility

September 23, 2023
Stealth Falcon preying over Middle Eastern skies with Deadglyph

Stealth Falcon preying over Middle Eastern skies with Deadglyph

September 23, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cyber Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved