Abstract

This chapter analyzes biometric systems as they relate to critical infrastructure protection and supervisory control and data acquisition (SCADA) security, and discusses how the functioning and weaknesses of biometric systems affect their use to authenticate access to secure systems and locations. It reviews vulnerabilities in biometric authentication and issues in system implementation. Finally, the chapter includes a discussion of the social and legal concerns surrounding the use of biometric identifiers for security purposes. In a SCADA security network, biometric components are useful only at the edges of the network, where people interact with the SCADA security and where secure facilities and equipment need authorized access. The variety of biometric readings, both invasive and remote, demonstrates that biometric security can meet a wide array of priorities within the overall security program. These devices are not foolproof and can be beaten at a number of different points of vulnerability, including tricking the scanners or reworking the system software. Storage and protection of biometric samples can also be hazardous. Finally, biometric systems are not yet so widespread that the law and regulations for biometric capture can be expected to remain constant over the several years of any company's investment in these systems.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call