ad info

 
CNN.com  technology > computing
    Editions | myCNN | Video | Audio | Headline News Brief | Feedback  

 

  Search
 
 

 
TECHNOLOGY
TOP STORIES

Consumer group: Online privacy protections fall short

Guide to a wired Super Bowl

Debate opens on making e-commerce law consistent

(MORE)

TOP STORIES

More than 11,000 killed in India quake

Mideast negotiators want to continue talks after Israeli elections

(MORE)

MARKETS
4:30pm ET, 4/16
144.70
8257.60
3.71
1394.72
10.90
879.91
 


WORLD

U.S.

POLITICS

LAW

ENTERTAINMENT

HEALTH

TRAVEL

FOOD

ARTS & STYLE



(MORE HEADLINES)
*
 
CNN Websites
Networks image


OPINION: Biometrics are not an invasion of privacy

Network World Fusion

May 26, 2000
Web posted at: 10:19 a.m. EDT (1419 GMT)

  MESSAGE BOARD
 

(IDG) -- Network security involves restricting access to data and services so only authorized people can get to them. This can be done by having a person identify himself either as an individual, a member of an authorized group (such as technical support), or the holder of an authorized role (such as a human resources clerk). Since there are dishonest people in the world, we ask people to prove their identity, their membership in the group or their authority to use the role.

MORE COMPUTING INTELLIGENCE
IDG.net   IDG.net home page
  Technology Insider: Biometrics
  Biometrics links
  The need for online identities
  Why everyone should sign digital documents
  Reviews & in-depth info at IDG.net
  E-BusinessWorld
  TechInformer
  Questions about computers? Let IDG.net's editors help you
  Subscribe to IDG.net's free daily newsletter for network experts
  Search IDG.net in 12 languages
  News Radio
  * Fusion audio primers
  * Computerworld Minute

Authorization takes the form of one or more of three general areas: what you know (password); what you have (smart card); or who you are (biometric). Passwords are frequently written down and left in insecure places. Smart cards are easily misplaced or forgotten. But biometrics you always have with you. Biometrics, in combination with either passwords or smart cards, or both, provides the strongest security for your network.

The biometric data stored in your directory service can't be used to identify an unknown person. The data collected for, say, a fingerprint is at the same time far less and far more than the data collected when you press your fingerprint onto a card at the police station. Biometric fingerprint devices collect a handful of metrics on the design of the fingerprint, but also collect data on the temperature, pressure and other properties, making it nearly impossible to provide a false identity. Pictures don't work. Wax fingers don't work. Fingers cut from a dead body don't work.

On the other hand, the data collected by itself is often poor at identifying an unknown fingerprint. It's only when asserting identity and confirming it through the use of a biometric that the system works.

There is absolutely no privacy issue involved, and the sooner we leave this false argument behind the better off our networks will be. And the better off the privacy of our personal data will be.




RELATED STORIES:
Security experts say hackers have the edge
May 11, 2000
Carnegie Mellon establishes anti-hacking institute
April 26, 2000
Census tests security
March 28, 2000
Government computers: The ultimate hackers' proving ground
March 23, 2000
IE5/Win2K security patch can lock out legitimate users
March 16, 2000

RELATED IDG.net STORIES:
Technology Insider: Biometrics
(Network World Fusion)
Are passwords are too insecure for the Net?
(PC World)
Biometrics links at Computerworld
(Computerworld)
Your one and only biometric identity
(Infoworld)
The need for online identities
(Infoworld)
Yahoo draws fire for revealing identities
(The Industry Standard)
Making it harder for cyber-criminals to steal your identity
(Infoworld)
Why everyone should sign digital documents
(Network World Fusion)

RELATED SITES:
12 questions to ask before you deploy a biometrics authentication suite
White paper on biometric and smart card user authentication
Read about the challenges that the biometric industry faces

Note: Pages will open in a new browser window
External sites are not endorsed by CNN Interactive.

 Search   

Back to the top   © 2001 Cable News Network. All Rights Reserved.
Terms under which this service is provided to you.
Read our privacy guidelines.