Page 88 - Cyber Defense eMagazine February 2024
P. 88

Identity Management Challenges


            By Milica D. Djekic



            There are a plenty of methods to determine someone’s identity and the most convenient cases are
            through fingerprint, iris detection, DNA and so on, while some of those indicators have become part of
            the biometrics IDs which serve in accurately being confident about who someone is, so far. On the other
            hand, the IDs can be counterfeited and in such a manner, it is obvious that as the Interpol suggested
            recently will be needed to confirm someone’s identity using a fingerprint reader on the borders or simply
            doing  biometrics  tracking  via  data  search  technologies  applying  as  a  criterion  of  the  crawling  some
            biometrics parameter being included into passport or identification card of some ID holder. In other words,
            some of the critical asset services could be subscribed using a counterfeit document and in such a case,
            it is needed to track those biometrics identity parameters within the Police register to see if there that
            document could serve for travelling or most likely some of those data being provided through such an ID
            could  be  entered  into  some  banking,  telecommunication  or  internet  account  giving  a  space  to  the
            offenders to create an account within such an infrastructure letting chance to the majority of them to be
            tracked in a cyber sense. What is needed in that fashion is to confirm some data and mainly a registration
            number of the fake document with that field among some of such created accounts and if it is caught that
            someone is with such a subscription account with, say, a cellular phone it is clear that once a mobile




            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          88
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   83   84   85   86   87   88   89   90   91   92   93