Unit 4 – Question 3

In my point of views, the futuristic cyber attacks are obviously biometric hacking. Biometric identification is in the palm of every modern smart phone users’ hands. People can unlock their devices with their face, eyes or fingerprints. Businesses have adopted biometric identification techniques for entry into offices and secure areas. Getting unfettered access to systems is the goal for hackers. As a result, the possibility of biometric data being hacked could pose risks to people and organizations.

iometrics is currently being used to verify people using these means:

  • Facial Identification
  • Fingerprint
  • Retina Scan
  • Signature
  • Voice Analysis
  • Palm Vein Identification
  • Hand Geometry

These techniques are also available but have not been as widely adopted:

  • Brain Waves
  • Walk Style
  • DNA
  • Heartbeat
  • Iris Scan
  • Methods to Hack Biometric Identification

    There are risks for every method of identification verification. The reward from imitating others is enough to draw the attention of hackers looking to profit from deception. A hacker needs to access biometric data and then use that data to their advantage.


+ There are no comments

Add yours