Today, almost every modern smart mobile device features fingerprint scanners and voice and facial recognition as the default mechanisms for access control. From an IT systems administration’s perspective, the advantage of these methods of identification over passwords, even one-time passwords (OTP) and two-factor authentication (2FA), is the great difficulty of faking a biometric sample or manipulating the biometric sensor into producing a false-positive result. For many years, this last statement stood largely unchallenged. However, we are possibly looking at the tipping point for the security of biometric applications.
Biometric Applications: Have They Reached A Security Tipping Point?
biometric applicationsbiometric identification methodFuture Of Biometric Identificationsecurity concernsbiometric identificationsecurity tipping point