Source 4. Advantages and Disadvantages of Biometrics
Source 4. Advantages and Disadvantages of Biometrics
Source 4. Advantages and Disadvantages of Biometrics
Hilary Reynolds
2021
Most common biometric devices today require face recognition and fingerprints to unlock.
However, there are other ways for biometrics to work. There are a wide range of different
‘physical’ characteristics that can be used (like iris or palm shape). In addition, there is a
growing acceptance of behavioral biometrics.
While biometric data and authentication are being adopted in many areas of modern life,
questions arise about the safety and privacy of users.
Experts classify authentication of a person’s identity by technology into three parts. These
are knowledge (something the user knows), possession (something the user has), and
inherence (something the user is). Traditional passwords are something the user knows.
Biometrics on the other hand use possession and inherence. When a device uses biometrics
the purpose is to verify the user is who they say they are. This is done by comparing their
biometric input with the data that’s been previously stored – something a user is and has.
There are two main types of biometrics: physiological and behavioral. Physiological
biometrics are often used in things like smartphones. Examples include a person’s
fingerprints, face shape, or eye pattern. Behavioral biometrics are concerned with how a
user acts. This might be how they use a computer mouse or keyboard. Both physiological and
behavioral traits can be converted into data and stored. This information can then be
compared with a user to identify them.
Biometric data can be collected on servers, or stored on the device itself. In some it is more
secure to store data on devices because no biometric information is sent over the internet to
the server.
1
Advantages of biometric authentication
Biometric authentication has a number of advantages:
1. High security and assurance. Biometric identification provides the answers to
“something a person has and is” and helps verify identity
2. User Experience – Easy and fast
3. Non-transferrable – Everyone has unique biometrics
4. Spoof-proof – Biometrics are hard to fake or steal
Non-transferable
Biometric authentication needs the user to be present. It is very easy to transfer a password
to someone else but this cannot be done with fingerprints.
Near spoof-proof
Biometrics, such as face patterns and fingerprints are nearly impossible to copy with current
technology. The chance of a user’s fingerprint matching someone else is one in 64 billion.
This makes it very difficult for hackers trying to access users’ accounts or information.
Data breaches
User information and data are valuable and tend to attract criminals. In particular, businesses
and governments that collect and store users’ personal data are under threat from hackers. If
the data is stolen the results can be very serious. Biometric data is difficult to replace so
companies need to use increased security and caution. Unfortunately, this increased security
is difficult and expensive. If a password or pin is stolen it is quite easy to change it. However,
the same is not true for a person’s physiological or behavioral biometrics.