QUT-investigation task-6
QUT-investigation task-6
, biometrics, smart
cards, etc.).
Intro
Authentication is the process in which a user or computer has to prove its identity to
the server or client. Authentication is important because it is the first line of defence
against cyber threats and data breaches, protecting sensitive information. Typically, it
entails the use of a username and password. However, with the development in
technology other methods of authentication are on the rise.
1, Authentication method
Biometrics authentication method uses the unique biological traits of users to verify
the identity and manage the level of access to the specific file. For example, facial
recognition. An image is captured first and then be used to identity the key facial
features. Then, a unique facial template will be created based on the features
identified above to compare with the stored database.
2, Encryption methods
Some similarities between smart cards and biometric authentication are how they
both are useful in preventing fraud. Biometric authentication requires the user to
possess a physical characteristic, that only they would have, to authenticate. While
the microchip embedded in the smart card is encrypted making it hard to be
intercepted or tampered with.
Both smart cards and biometric authentication are highly scalable. Meaning that they
can be adapted for small, medium and large organizations. As organisations grow,
using password authentication can cause systems to become more vulnerable. In
contrast, both smart cards and biometric authentication systems can expand without
significant changes to the infrastructure or the level of vulnerability of the
organisation.
Another similarity between biometric authentication and smart cards is that they are
both users friendly. The majority of the time when using a smart card, users have to
either, tap or insert their card into a reader. And with biometric authentication, such
as face or voice recognition users simply have to look at the device or speak a phrase.
Both these authentication methods streamline the process in comparison to
traditional methods such as password or pins and they reduced the risk of human
error of forgetting a pin or password.
All in all, biometric and smart card authentication are both secure methods of
authentication for different applications. With biometric authentication being more
widespread in banking, devices, law enforcement, and airport security, whereas smart
cards are used for room access in hotels and businesses, and more recently the Tesla
keys.
In the future, it is expected that both smart cards and biometric authentication will
evolve, with advancements in on-chip cryptography–chips designed to handle
encryption and decryption enhancing security and resistance against cyber threats–
and miniaturisation which is making the cards smaller and still maintaining its
function.
Learning Journey
Sources we found useful were LoginTC and Microsoft, both trusted and accredited
sources which aided us during our research process by providing insightful information
about what biometric and smart card authentication is and how it works.