Retina Scanner Fingerprints and Biometric Sign In

Programming w/ Professor Sluiter
21 Aug 201909:29

Summary

TLDRIn this informative video, Professor Chad Schlueter from Grand Canyon University discusses the evolution of authentication methods beyond the traditional password. He highlights the importance of considering alternatives such as biometrics, token authentication, two-factor authentication, and single sign-on to enhance application security. The video provides insights into the practical challenges and potential of each method, urging developers to think creatively about user authentication to protect sensitive information more effectively.

Takeaways

  • 🔑 Understanding various authentication methods is crucial for application developers to enhance security.
  • 👨‍🏫 The speaker, Shad Schlueter, is a professor at Grand Canyon University, teaching computer security and development.
  • 🛡️ Secure passwords are important, but biometrics such as retina scans, fingerprints, and handprints offer more robust security options.
  • 🔒 Two-factor authentication (2FA) improves security by requiring a second verification step, often with a timestamped token.
  • 📜 Bill Gates predicted in 2004 that traditional passwords would become obsolete, highlighting the need for better security measures.
  • 🆔 Differentiating between identity (who you are) and authentication (proving who you are) is essential in security contexts.
  • 🧬 DNA can be used to identify and authenticate individuals in criminal cases, though its application varies.
  • 🖥️ Biometric authentication can sometimes result in false positives or negatives, but technology is improving.
  • 📱 Two-factor authentication commonly uses SMS or app-based codes to enhance security, though vulnerabilities exist.
  • 🔗 Single sign-on (SSO) simplifies login processes by allowing users to authenticate via third-party services like Google or Facebook, reducing password management issues.

Q & A

  • What are the four different types of authentication methods discussed in the video?

    -The video discusses secure passwords, biometrics (including retina, hand, fingerprint, and voice recognition), two-factor authentication, and single sign-on as authentication methods.

  • Who is the speaker in the video and what is his profession?

    -The speaker in the video is Chad Schlueter, a professor at Grand Canyon University who teaches computer security classes, application development, and web development with computer science.

  • What did Bill Gates predict about the future of passwords in 2004?

    -Bill Gates predicted the death of the password in 2004, stating that traditional password-based security is headed for extinction as it does not meet the challenges of our more complex needs for information security.

  • What is the difference between identity and authentication as explained in the video?

    -Identity refers to the process of identifying or finding a person, while authentication is the process of verifying that a person is who they claim to be. For example, a username represents identity, and a password represents authentication.

  • How does the video illustrate the difference between using DNA for authentication and identification?

    -The video uses the analogy of DNA in a criminal case to illustrate the difference. DNA used to authenticate a person already arrested for a crime is for authentication, whereas using DNA to match against a database of millions to find potential suspects is for identification.

  • What are some of the issues with biometric authentication as mentioned in the video?

    -The video mentions issues such as false positives and false negatives, which can lead to either incorrect rejection or acceptance of an individual. It also mentions the possibility of biometric data being spoofed, as in the case of the doctor using silicone fingers to fool a biometric attendance device.

  • What is token authentication and how does it work?

    -Token authentication is a method where a physical object, either static or dynamic, is used for logins. A static token could be an ID card, while a dynamic token like RSA SecurID changes its code every 30 seconds or 60 seconds, which is then used as a password.

  • How does two-factor authentication enhance security compared to a single password?

    -Two-factor authentication requires not only a password but also a second form of verification, such as a code sent to a user's phone or a token device, making it more difficult for unauthorized access as both factors need to be compromised to gain entry.

  • What is single sign-on and what are its advantages?

    -Single sign-on (SSO) is a process that allows a user to log in once and gain access to multiple systems or applications without needing to log in again for each one. The advantages include convenience for users and reduced liability for developers, as they do not need to store passwords on their service.

  • What are some of the security concerns with two-factor authentication using SMS texting mentioned in the video?

    -The video mentions that it's possible to fake a phone and clone another phone to receive and send texts, which can undermine the security of two-factor authentication that relies on SMS texting.

  • What advice does Chad Schlueter give for application developers regarding authentication methods?

    -Chad Schlueter advises application developers to consider authentication methods beyond just passwords, to use two-factor sign-on when possible, to explore biometrics if security concerns are high and funds allow, to implement single sign-on, and to consider the use of authentication tokens.

Outlines

00:00

🔒 Introduction to Advanced Authentication Methods

In this introductory paragraph, Shad Schlueter, a professor at Grand Canyon University, sets the stage for a discussion on various authentication methods beyond traditional passwords. He introduces the topic by highlighting the inadequacy of passwords alone in securing applications and emphasizes the importance of exploring alternative methods. The paragraph touches on biometrics, two-factor authentication, and the distinction between identity and authentication. It also references a 2004 news story where Bill Gates predicts the end of password-based security, indicating a long-standing recognition of the need for more robust methods.

05:00

👁️ Biometric Authentication: Challenges and Potential

This paragraph delves into the realm of biometric authentication, discussing its potential and the challenges it faces. Shad Schlueter explains the concept of biometrics, such as retina scans, fingerprints, and voice recognition, and acknowledges the issues of false positives and negatives. He uses the example of a Brazilian doctor who fraudulently used silicone fingers to fool a biometric system, illustrating that while biometrics offer a high level of security, they are not without their flaws. The paragraph also raises questions about the balance between security and user convenience, suggesting that some margin of error may be necessary to avoid frustrating users.

🔑 Token Authentication and Two-Factor Authentication

The focus shifts to token-based authentication, describing both static and dynamic tokens as physical devices that add an extra layer of security. Shad Schlueter explains how a dynamic token, such as an RSA SecurID, generates a new number every 30 seconds to be used as a password, making it difficult for unauthorized access. The paragraph also covers the common practice of two-factor authentication using cell phones, where a code is sent to the user's device before they can enter their password. However, Schlueter points out that even this method is not foolproof, as demonstrated by the possibility of cloning phones to intercept authentication codes.

📝 Single Sign-On and Its Benefits for Security and Convenience

In the final paragraph, Shad Schlueter discusses the concept of single sign-on (SSO), where users can log in to applications using their existing accounts from third-party services like Facebook or Google. He outlines the benefits of SSO for both users, who don't need to remember additional passwords, and developers, who avoid storing passwords on their services. Schlueter also touches on the security implications of SSO, noting that it reduces the liability in case of a data breach, as no passwords are stored. The paragraph concludes with a summary of the various authentication methods discussed and a call to action for developers to consider these methods when building secure applications.

Mindmap

Keywords

💡Authentication

Authentication is the process of verifying the identity of a user or device. In the video, it is discussed as a crucial aspect of securing applications, with methods ranging from passwords to biometrics. Examples include the use of fingerprints or two-factor authentication to ensure that the person accessing a system is who they claim to be.

💡Biometrics

Biometrics refers to the use of physical characteristics, such as fingerprints, retina scans, or voice recognition, to identify and authenticate individuals. The video highlights biometrics as a more secure alternative to passwords, although it notes the potential for false positives and negatives.

💡Two-factor authentication (2FA)

Two-factor authentication (2FA) is an extra layer of security that requires not only a password and username but also something that only the user has on them, such as a physical token or a mobile phone. The video explains how 2FA can enhance security by requiring a dynamic code in addition to a password.

💡Single sign-on (SSO)

Single sign-on (SSO) allows users to log in once and gain access to multiple systems without being prompted to log in again at each of them. The video mentions SSO as a way to simplify user authentication and reduce the number of passwords users need to remember, thereby enhancing security and convenience.

💡Password

A password is a secret word or phrase that must be used to gain admission to something. The video starts by mentioning that while passwords are a traditional method of authentication, they are becoming insufficient due to increasing security needs and vulnerabilities.

💡Token authentication

Token authentication involves using a physical device, like a security token, to produce a unique code that verifies a user’s identity. The video illustrates how tokens, such as RSA SecurID tags, can offer dynamic and more secure ways to authenticate users compared to static passwords.

💡False positives and false negatives

False positives occur when an authentication system incorrectly accepts an unauthorized user, while false negatives happen when it wrongly rejects an authorized user. The video discusses these issues in the context of biometric systems, which must balance accuracy with user convenience.

💡Identity

Identity refers to the qualities, beliefs, personality, looks, and expressions that make a person. In the video, identity is distinguished from authentication; identity is who a person is, while authentication is proving that identity. For example, a username represents identity, and a password proves it.

💡Secure password

A secure password is a password that is difficult to guess or break through brute force. The video emphasizes that even though passwords are fundamental, they must be complex and unique to enhance security, and are often used alongside other methods like 2FA for better protection.

💡Dynamic token

A dynamic token is a type of token used in two-factor authentication that changes codes at regular intervals, typically every 30 or 60 seconds. The video highlights the RSA SecurID as an example of a dynamic token, which enhances security by making it harder for attackers to use stolen codes.

Highlights

Introduction of four different types of authentication methods for application developers to enhance app security.

Biometrics as an alternative to traditional passwords, including retina, hand, and fingerprint scanning.

The distinction between identity and authentication, with examples of how they function.

The concept of two-factor authentication and its implementation with special timestamps using tokens.

Bill Gates' 2004 prediction of the death of the password and the evolution towards more secure methods.

Discussion on the accuracy and margin of error in biometric authentication systems.

A real-world case of biometric fraud involving silicone fingers to fool attendance systems.

Token authentication as a secure method, with examples of static and dynamic tokens.

The security benefits of two-factor authentication, especially when combined with physical tokens.

The vulnerability of SMS-based two-factor authentication and the rise of application-based alternatives.

Single sign-on as a convenient and secure method for user authentication.

The advantages of using third-party services for login, reducing the need for multiple passwords.

The security implications of storing passwords on services and the trust placed in large providers.

The importance of considering authentication methods beyond passwords in application development.

The potential of biometrics for high-security applications, despite current limitations.

The role of single sign-on in improving security by reducing the number of passwords users need to remember.

The consideration of authentication tokens as a secure option for application developers.

Conclusion emphasizing the importance of strong authentication in secure systems and various methods to achieve it.

Transcripts

play00:00

hello in this video we're going to talk

play00:02

about four different types of

play00:03

authentication methods that you should

play00:05

consider if you're an application

play00:07

developer and working on making your

play00:08

apps more secure

play00:10

my name is shad Schlueter I'm a

play00:11

professor at Grand Canyon University I

play00:14

teach computer security classes

play00:15

application development and web

play00:17

development with computer science in

play00:19

this video we're going to talk about

play00:21

authentication methods so you can see

play00:23

from the pictures scattered around the

play00:24

background that there are far more

play00:26

methods than just a password first of

play00:28

all a secure password is a good idea but

play00:30

think of your biometrics you can scan

play00:32

your retina you can scan your hand your

play00:34

fingerprint or you could use some kind

play00:36

of a two-factor authentication or even

play00:38

better

play00:39

two-factor with a special timestamp

play00:41

using tokens and so that's what we'll

play00:43

see here in the next few minutes check

play00:45

out this news story from the year 2004

play00:48

so Bill Gates predicts the death of the

play00:52

password he says traditional password

play00:54

based security is headed for extinction

play00:55

it does not meet the challenges of our

play00:58

more needs for our information so

play01:00

obviously for a long time people have

play01:02

seen the needs for something better than

play01:04

just a password think about the purposes

play01:06

of passwords and our usernames what's

play01:09

the difference between an identity and

play01:10

an authentication well if you were to

play01:13

think of your username as your identity

play01:15

and then your password as your

play01:17

authentication you've got the right idea

play01:19

and so if you put things that are like

play01:21

biometrics in the play then you can have

play01:24

both of these in one package

play01:26

identification means can I find you are

play01:29

you the person that's supposed to be

play01:31

here and authentication is asking the

play01:33

question do I know you

play01:35

so for instance hi we just met can you

play01:37

prove to me that you're the person you

play01:39

say you are you say your name's John how

play01:41

do I really know that can you show me

play01:43

your driver's license can you show me

play01:44

your identification can I get your

play01:47

mother's maiden name or some kind of a

play01:48

question like that a password is how we

play01:51

authenticate people normally to contrast

play01:53

the difference between authentication

play01:55

and identification I'd like you to think

play01:58

about how we would use DNA in a criminal

play02:01

case so DNA can be used as evidence in

play02:04

court but the question is should we use

play02:07

it as to authenticate people or to

play02:09

identify the criminal so look at the

play02:12

difference between identity and a

play02:13

indicate and then register your answer

play02:16

which one is it well let's talk about

play02:18

authentication first let's say if we

play02:21

tried to take a person that was already

play02:24

arrested for the case there was probable

play02:26

cause the police found them or maybe a

play02:29

video camera saw them or there was a

play02:31

witness

play02:32

and so the persons arrested and put on

play02:34

trial then DNA that is compared from the

play02:38

case that was gathered at the at the

play02:40

crime scene is gathered and kind of

play02:42

compared to the person that would be

play02:44

trying to authenticate the person

play02:46

however think of it as if we'd used a

play02:48

DNA in a way to identify the person so

play02:51

here's the scenario DNA is taken from

play02:53

the crime scene

play02:54

and then we compare it to see if there's

play02:56

a match to a million different entries

play02:59

of DNA that we have on file and so we

play03:02

would take a million people and if there

play03:05

is a 99% correlation or better then we

play03:08

arrest all those people and bring them

play03:10

to trial

play03:10

well obviously the second case sounds

play03:13

more like what they would do in China or

play03:15

North Korea or somewhere where they're

play03:16

more authoritarian and not so much

play03:18

interested in human rights so identity

play03:21

is not the way that you would try to

play03:23

solve this case now back to computer

play03:26

problems think of how you could make

play03:28

your application more convenient and

play03:30

perhaps better than just passwords so

play03:33

biometrics is one solution that people

play03:35

have been working on for many years so

play03:38

whether you do a handprint or

play03:39

fingerprint or retina scan or you might

play03:42

even use your voice so let's take a look

play03:44

here at an example from a movie from

play03:46

1992 called sneakers

play04:21

now the problem with biometrics is that

play04:23

there are false positives and false

play04:25

negatives so you for I've been

play04:28

frustrated by your phone if you try to

play04:29

press your fingerprint on it and doesn't

play04:31

read it it doesn't read it it doesn't

play04:32

read it anything uh the stupid thing I

play04:34

would just if I had a password I could

play04:36

get in

play04:37

well the question is should Samsung be

play04:40

100% accurate in registering your

play04:42

fingerprint or should there be some

play04:44

margin of error so if your fingerprint

play04:48

registers all the time immediately does

play04:51

that mean that your friends could also

play04:53

use your phone you ever tested it can

play04:55

you fake your phone out and so should

play04:58

some pulse false positives be allowed

play05:00

and I think the answer has to be yes

play05:02

because they would annoy their customers

play05:04

too much if they were very very picky so

play05:07

they're getting better at it obviously

play05:08

they don't want to just let everybody

play05:10

into the phone but they're more accurate

play05:12

than they used to be speaking of

play05:15

biometric authentication here's a nice

play05:17

story a doctor used silicone fingers

play05:20

here to sign-in for colleagues and so

play05:22

the story goes like this

play05:23

a Brazilian doctor is facing charges of

play05:25

fraud and so he was signing in his

play05:28

absent e's his friends at work using

play05:32

silicone fingers that they faked

play05:34

so they used prosthetic fingers to fool

play05:37

the biometric attendance device well

play05:39

whenever there's a foolproof solution

play05:41

there's always are some pretty smart

play05:43

fools biometric security sounds like

play05:46

it's going to be great if we could get

play05:48

it to work right all the time

play05:49

then we could kill passwords but

play05:51

obviously we're not quite there yet

play05:53

another nice way to increase your

play05:55

security is using token authentication

play05:57

so you can see here we have two

play05:59

different ways to take a token a

play06:01

physical object and use that for logins

play06:04

so a static token could be like your

play06:06

company ID card or a dynamic token might

play06:10

be with this RSA SecurID tag that

play06:12

changes every 30 seconds and that number

play06:15

that's on the tag is used to as your

play06:18

password and so both of these are

play06:20

physical devices that you'd have to

play06:22

fake or steal if you wanted to break in

play06:25

so two-factor authentication with a

play06:27

secure ID looks like this you use your

play06:30

login name and then your passcode has to

play06:33

be entered plus a password and then this

play06:35

little key chain that has a unique

play06:38

random number on it every 60 seconds

play06:41

also has to be used so far more secure

play06:44

than just asking for a person's password

play06:46

so probably more commonly you would use

play06:49

two-factor identification with your cell

play06:51

phone a lot of times when you sign into

play06:53

a bank or some financial institution

play06:56

they will send you a four digit code and

play06:59

it has to come to your phone before you

play07:01

can actually enter your password so

play07:03

those are more secure however recently

play07:06

it has been has been brought to the

play07:08

attention that it's possible to fake a

play07:10

phone as well you can get applications

play07:12

that will clone another phone and then

play07:14

you can receive and send text on their

play07:16

device without ever actually stealing

play07:18

their device and so two-factor

play07:20

authentication it's got some

play07:22

improvements to go and using

play07:24

applications rather than just SMS

play07:26

texting it really works even though it

play07:29

slows down our logins a little bit

play07:31

another great way for an application

play07:34

developer to increase security is to use

play07:36

a process called single sign-on we've

play07:39

all seen websites that say you can

play07:40

create a user account or you can just

play07:43

click here to sign in with Facebook or

play07:44

sign in with Google and so this allows a

play07:47

third-party service to log in now the

play07:50

advantage here is that it's simple for

play07:52

both the programmers and the users so

play07:55

for the user they don't have to remember

play07:57

another password for the programmer you

play07:59

don't actually have to store any

play08:01

passwords on your service so in many

play08:04

cases when a business is hacked the

play08:07

accounts of the let's say Yahoo for

play08:09

example 3 billion user accounts are

play08:12

downloaded and put away into text files

play08:14

and sent off to China however if there's

play08:17

no passwords to be associated with those

play08:20

usernames then you don't really have the

play08:23

liability you kind of have to trust

play08:25

Google that they're not going to get

play08:27

hacked which so far they haven't but

play08:30

they're probably more secure than any

play08:32

small business that you've ever worked

play08:34

and so security is actually improved

play08:37

when we have fewer passwords to remember

play08:39

so in conclusion we could say that

play08:42

authentication is a weak point in many

play08:44

secure systems and so think about other

play08:47

things than just the password if you're

play08:49

going to create an application remember

play08:51

authentication is not the same as

play08:53

identification use two-factor sign-on

play08:55

whenever possible if you've got the

play08:57

money and you have security concerns go

play08:59

with biometrics single sign-on should be

play09:01

a factor in when you're thinking of

play09:03

building any application and also if you

play09:06

have the ability to create

play09:07

authentication tokens let's consider

play09:09

those as well so thanks for watching

play09:11

those are some ideas that you could use

play09:13

for authenticating your users my name is

play09:16

chad Schlueter as I told you I work at

play09:18

Grand Canyon University

play09:19

check out the hundreds of other videos

play09:21

on my site to learn how to be a web

play09:23

developer an application developer and

play09:25

to become more secure in your computer

play09:27

programming

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
AuthenticationSecurityBiometricsTwo-FactorTokensSingle Sign-OnCybersecurityApp DevelopmentPasswordlessWeb Security
Benötigen Sie eine Zusammenfassung auf Englisch?