Page 88 - Cyber Defense eMagazine February 2024
P. 88
Identity Management Challenges
By Milica D. Djekic
There are a plenty of methods to determine someone’s identity and the most convenient cases are
through fingerprint, iris detection, DNA and so on, while some of those indicators have become part of
the biometrics IDs which serve in accurately being confident about who someone is, so far. On the other
hand, the IDs can be counterfeited and in such a manner, it is obvious that as the Interpol suggested
recently will be needed to confirm someone’s identity using a fingerprint reader on the borders or simply
doing biometrics tracking via data search technologies applying as a criterion of the crawling some
biometrics parameter being included into passport or identification card of some ID holder. In other words,
some of the critical asset services could be subscribed using a counterfeit document and in such a case,
it is needed to track those biometrics identity parameters within the Police register to see if there that
document could serve for travelling or most likely some of those data being provided through such an ID
could be entered into some banking, telecommunication or internet account giving a space to the
offenders to create an account within such an infrastructure letting chance to the majority of them to be
tracked in a cyber sense. What is needed in that fashion is to confirm some data and mainly a registration
number of the fake document with that field among some of such created accounts and if it is caught that
someone is with such a subscription account with, say, a cellular phone it is clear that once a mobile
Cyber Defense eMagazine – February 2024 Edition 88
Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.