Page 29 - Cyber Defense eMagazine February 2024
P. 29

How so? Businesses can make things better for everyone by confirming a user’s identity through the
            integration of biographic information with biometric information



            The Benefits and Limitations of Biographic Information

            People and businesses use biographic information – name, address, date of birth, and other identifiers –
            all the time as a way to ascertain that a person is who they claim to be.

            This is a good thing – as far as it goes. Biographic information, after all, is a basic element of identity
            verification in so many instances, serving as the initial layer of authentication. A business can match the
            information a person provides with existing records to establish a foundational level of trust. Yes, this
            person appears to be who they claim to be.


            Unfortunately,  biographic  information  isn’t  always  enough.  Cybercriminals  are  frustratingly  adept  at
            breaking through cybersecurity efforts and stealing people’s personal data. With that data in hand, they
            masquerade as the real person, creating problems for businesses and for the identity-theft victims. It’s
            disturbing beyond measure, but it’s also, sadly, the reality we face.

            Fortunately, there is an excellent way to bolster the biographic information without bogging down users
            with all those passwords, PINs, and other security steps. This is by using biographic information backed
            up with biometric information. Together, the two make an outstanding team.



            The Integration of 2 Types of Identifiers

            Cybercriminals  face  a  much  greater  challenge  in  trying  to  steal  someone’s  identity  when  biometric
            information is involved.

            This is because biometric information encompasses unique physical or behavioral traits that distinguish
            one person from another.

            Common biometric qualities or attributes include fingerprints, facial recognition, iris scans, and voice
            recognition. In some cases, even behavioral biometrics come into place, such as how an individual uses
            keystrokes when typing on the computer. Once a person’s keystroke rhythm is determined and recorded,
            then that becomes another identifier.

            An identity thief might be able to steal records related to birth dates and addresses, but these biometric
            markers aren’t so easy to forge. The thief may present a name, age, and address that says they are a
            particular person, but facial recognition says otherwise.

            This  is  why  biometric  markers  are  ideal  for  enhancing  the  security  of  online  transactions.  Integrate
            biometric information into the process and businesses can reduce the risk of fraudulent activities.








            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          29
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   24   25   26   27   28   29   30   31   32   33   34