Difference between revisions of "Fingerprint Identification vs Password Authentication"
Kpangilinan (talk | contribs) |
Kpangilinan (talk | contribs) |
||
Line 8: | Line 8: | ||
= Thesis Statement = | = Thesis Statement = | ||
==== Thesis ==== | ==== Thesis ==== | ||
− | Passwords are currently the most common way of securing our data and personal information on our computers, web accounts, and networks nowadays, yet it is still open to many security risks. | + | (Original thesis) Passwords are currently the most common way of securing our data and personal information on our computers, web accounts, and networks nowadays, yet it is still open to many security risks. It is argumentative that fingerprint identification would be both a negative and positive investment on top of the password technique for protecting our data online and offline. |
==== Keywords ==== | ==== Keywords ==== | ||
Line 39: | Line 39: | ||
= Research Notes = | = Research Notes = | ||
+ | ==== Preliminary Research ==== | ||
+ | Overview, introduction, interesting facts/data on passwords and fingerprint identification: | ||
+ | <ul> | ||
+ | <li>http://en.wikipedia.org/wiki/Password</li> | ||
+ | <li>http://en.wikipedia.org/wiki/Fingerprint#Fingerprints_used_for_identification</li> | ||
+ | </ul> | ||
+ | |||
+ | Thesis: | ||
+ | Fingerprint-based identification is an old but successful method of authorization. Passwords are currently the most common way of securing our data and personal information on our computers, web accounts, and networks nowadays, yet it is still open to many security risks. Would it be a better investment having the combination of fingerprint identification and the password technique than a simple or complex password for protecting our data online and offline? | ||
+ | |||
+ | Fingerprint identification: | ||
+ | Advantage: | ||
+ | <ul> | ||
+ | <li>Strong password + fingerprint ID</li> | ||
+ | <li>Weak password + fingerprint ID</li> | ||
+ | <li>Unique password</li> | ||
+ | <li>Identify individuals</li> | ||
+ | <li>Immune to key-logging software</li> | ||
+ | </ul> | ||
+ | Disadvantage: | ||
+ | <ul> | ||
+ | <li>Twins have identical fingerprints</li> | ||
+ | <li>Slow process (inconvenient)</li> | ||
+ | <li>Expensive</li> | ||
+ | <li>How to share data/accounts with a fingerprint?</li> | ||
+ | </ul> | ||
+ | |||
+ | Password: | ||
+ | Advantage: | ||
+ | <ul> | ||
+ | <li>Strong password</li> | ||
+ | <li>Easy access</li> | ||
+ | </ul> | ||
+ | Disadvantage: | ||
+ | <ul> | ||
+ | <li>Weak password</li> | ||
+ | <li>Forgetting password</li> | ||
+ | <li>Strong password is still hackable</li> | ||
+ | <li>Using same password for all accounts</li> | ||
+ | </ul> |
Revision as of 15:51, 4 November 2010
BTH740 | Weekly Schedule | Research Projects | Research Essay | Student Resources
Contents
Fingerprint Identification versus Password Authentication
Thesis Statement
Thesis
(Original thesis) Passwords are currently the most common way of securing our data and personal information on our computers, web accounts, and networks nowadays, yet it is still open to many security risks. It is argumentative that fingerprint identification would be both a negative and positive investment on top of the password technique for protecting our data online and offline.
Keywords
fingerprint identification, password authentication, encryption, web account, computer login, network, password fatigue, biometrics, computer networks, fingerprinting, computer security, identification systems, computers, security measures
Bibliography
Charles P. Pfleeger, "Computer security," in AccessScience, ©McGraw-Hill Companies, 2008, http://www.accessscience.com
Diane E. Levine. "Let Your Fingerprint Be Your Password. " InternetWeek 7 Jun 1999: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.
George V Hulme. "Slow acceptance for biometrics. " InformationWeek 10 Feb. 2003: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.
J. Edgar Hoover, Edward R. German, "Fingerprint," in AccessScience, ©McGraw-Hill Companies, 2008, http://www.accessscience.com
John R. Cordani, "Computer security and privacy," in AccessScience, ©McGraw-Hill Companies, 1999, http://www.accessscience.com
Larry Armstrong tech&you@businessweek.com. "LET YOUR FINGERS DO THE LOG-IN Fingerprint scanners are now affordable. But they're not yet glitch-free. " Business Week 1 Sep. 2003: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.
Michael D'Amour. "Fingerprint scans ensure only authorized workers can access data. " Computing Canada 17 Sep. 1999: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.
Ong Thian Song, Andrew Teoh Beng Jin, and Tee Connie. "Personalized biometric key using fingerprint biometrics. " Information Management & Computer Security 15.4 (2007): 313. ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.
Pamela Sherrid. "You can't forget this password. " U.S. News & World Report 17 May 1999: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.
Simon A. Cole, "Fingerprint identification," in AccessScience, ©McGraw-Hill Companies, 2007, http://www.accessscience.com
Stephen Regenold. "FINGERPRINT SECURITY. " Presentations 1 Feb. 2005: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.
Todd Haselton. "Giving your passwords the finger: a review of fingerprint scanners." Ars Technica. June 24, 2007. <http://arstechnica.com/hardware/reviews/2007/06/review-of-fingerprint-scanners.ars/>
Research Notes
Preliminary Research
Overview, introduction, interesting facts/data on passwords and fingerprint identification:
- http://en.wikipedia.org/wiki/Password
- http://en.wikipedia.org/wiki/Fingerprint#Fingerprints_used_for_identification
Thesis: Fingerprint-based identification is an old but successful method of authorization. Passwords are currently the most common way of securing our data and personal information on our computers, web accounts, and networks nowadays, yet it is still open to many security risks. Would it be a better investment having the combination of fingerprint identification and the password technique than a simple or complex password for protecting our data online and offline?
Fingerprint identification: Advantage:
- Strong password + fingerprint ID
- Weak password + fingerprint ID
- Unique password
- Identify individuals
- Immune to key-logging software
Disadvantage:
- Twins have identical fingerprints
- Slow process (inconvenient)
- Expensive
- How to share data/accounts with a fingerprint?
Password: Advantage:
- Strong password
- Easy access
Disadvantage:
- Weak password
- Forgetting password
- Strong password is still hackable
- Using same password for all accounts