7th information security

7th Information Security

What is the 7th information security? You can have more awareness of this topic. If you want to understand more information, read this study.

What is the 7th Information Security?

The 7th information security is to use a non-password authentication scheme. Also, the 7th information security does not depend on a password as a weak authentication method. 

In this case, it is not necessary to manage the password in a centralized fashion, and it can be for a wide variety of applications. Also, biometric authentication is the use of biometric information such as fingerprints, iris recognition, face recognition, etc., for user authentication.

How Does Biometric Authentication Work?

Biometric authentication is the comparison between information at the time of measurement (biometric information). Also, previously registered information (reference biometric information). 


Ads by IST





To compare these two sets of data correctly and correctly, it is necessary to ensure that the following two conditions are satisfied. 

One is biometric information. To ensure that the same biometric information is not for multiple registrations, biometric information such as fingerprint, face image, an iris image, etc., is for biometric authentication. 

The other is the reference information. The reference information used here is a personal secret number, nickname, password, and other types of private information that are difficult to leak to third parties.  

In addition to these two types of information, the user’s body or behavior may be by cameras when using biometric authentication. 

Thus, an authentication system using biometrics requires a trusted device, a trusted environment, and a trusted person, because the biometric information is difficult to change and is a fundamental element of the user’s identity.

Non-password Authentication Scheme: Initiatives

An initiative to use a non-password authentication scheme has been as a response to the need for secure and convenient authentication methods. 

In recent years, several schemes have been for our proposed non-password authentication schemes. 

Two-step verification 

Two-step verification on a password is the most widely method of non-password authentication. 

In addition to the operation above, it is necessary to register an application on a mobile phone or PC, but this method can be for various applications, and it is easy to operate when using an application.  

However, the password is still a weak authentication method, and it is not safe to use on a PC or mobile phone which has no security protection.  

On the other hand, there is a need for a secure method of authentication that can be on a PC or mobile phone which is an information processing terminal with an open structure and does not have sufficient security protection installed.  

Non-password Authentication Scheme: Drawbacks

It is difficult to protect the password in the case of authentication using a password. Also, there is a risk of a leak of personal information and loss of money by using a mobile phone or PC without sufficient security protection.  

There are also other security issues such as falsification or theft, etc. of biometric information. Thus, the 7th information security uses biometric authentication as an example for a non-password authentication scheme.  

Conclusion

In conclusion, a non-password authentication scheme is a method of authentication that does not use a password as a weak authentication method. This scheme may be used in various applications and maybe by providing the user with information that is easy to understand and easy to use.  

However, it is necessary to protect biometric information from leaks or theft. Thus, it is necessary to improve the security level of biometric information.  

Click to rate this post!
[Total: 0 Average: 0]

Ads by IST





Leave a Comment

Your email address will not be published.