Open main menu

CDOT Wiki β

Fingerprint Identification vs Password Authentication

Revision as of 16:51, 4 November 2010 by Kpangilinan (talk | contribs)

Fingerprint Identification versus Password Authentication

Thesis Statement

Thesis

(Original thesis) Passwords are currently the most common way of securing our data and personal information on our computers, web accounts, and networks nowadays, yet it is still open to many security risks. It is argumentative that fingerprint identification would be both a negative and positive investment on top of the password technique for protecting our data online and offline.

Keywords

fingerprint identification, password authentication, encryption, web account, computer login, network, password fatigue, biometrics, computer networks, fingerprinting, computer security, identification systems, computers, security measures

Bibliography

Charles P. Pfleeger, "Computer security," in AccessScience, ©McGraw-Hill Companies, 2008, http://www.accessscience.com

Diane E. Levine. "Let Your Fingerprint Be Your Password. " InternetWeek 7 Jun 1999: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.

George V Hulme. "Slow acceptance for biometrics. " InformationWeek 10 Feb. 2003: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.

J. Edgar Hoover, Edward R. German, "Fingerprint," in AccessScience, ©McGraw-Hill Companies, 2008, http://www.accessscience.com

John R. Cordani, "Computer security and privacy," in AccessScience, ©McGraw-Hill Companies, 1999, http://www.accessscience.com

Larry Armstrong tech&you@businessweek.com. "LET YOUR FINGERS DO THE LOG-IN Fingerprint scanners are now affordable. But they're not yet glitch-free. " Business Week 1 Sep. 2003: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.

Michael D'Amour. "Fingerprint scans ensure only authorized workers can access data. " Computing Canada 17 Sep. 1999: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.

Ong Thian Song, Andrew Teoh Beng Jin, and Tee Connie. "Personalized biometric key using fingerprint biometrics. " Information Management & Computer Security 15.4 (2007): 313. ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.

Pamela Sherrid. "You can't forget this password. " U.S. News & World Report 17 May 1999: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.

Simon A. Cole, "Fingerprint identification," in AccessScience, ©McGraw-Hill Companies, 2007, http://www.accessscience.com

Stephen Regenold. "FINGERPRINT SECURITY. " Presentations 1 Feb. 2005: ABI/INFORM Global, ProQuest. Web. 18 Oct. 2010.

Todd Haselton. "Giving your passwords the finger: a review of fingerprint scanners." Ars Technica. June 24, 2007. <http://arstechnica.com/hardware/reviews/2007/06/review-of-fingerprint-scanners.ars/>

Research Notes

Preliminary Research

Overview, introduction, interesting facts/data on passwords and fingerprint identification:

Thesis: Fingerprint-based identification is an old but successful method of authorization. Passwords are currently the most common way of securing our data and personal information on our computers, web accounts, and networks nowadays, yet it is still open to many security risks. Would it be a better investment having the combination of fingerprint identification and the password technique than a simple or complex password for protecting our data online and offline?

Fingerprint identification: Advantage:

  • Strong password + fingerprint ID
  • Weak password + fingerprint ID
  • Unique password
  • Identify individuals
  • Immune to key-logging software

Disadvantage:

  • Twins have identical fingerprints
  • Slow process (inconvenient)
  • Expensive
  • How to share data/accounts with a fingerprint?

Password: Advantage:

  • Strong password
  • Easy access

Disadvantage:

  • Weak password
  • Forgetting password
  • Strong password is still hackable
  • Using same password for all accounts