Abstract

Research background:In today’s globalised world, there is an increasing need for reliable verification of users’ identity accessing various types of information systems. This verification is realised through authentication, which is traditionally divided according to the kind of identification mark that is used: knowledge authentication (e.g., passwords, control questions), authentication through an authentication object (e.g., magnetic cards, smart cards) and biometric authentication (e.g., voice, face recognition). However, it should be noted that this identity may not only be the specific identity of the user but also, for example, his group affiliation or ability.Purpose of the article:This paper aims to identify and describe the impact of globalisation on selected types of authentication.Methods:As the representative of the current methods of authentication of persons are selected a password authentication and hand-based biometric authentication. The most often used methods of password attacks are simulated through mathematical modelling, and the results are compared concerning the timeline. Through modelling, multi characteristics authentication using the thermal characteristics of the hand will be presented.Findings & Value added:Through mathematical modelling, the article demonstrates the influence of globalisation on the resilience of passwords to the most commonly used attacks and discusses the impact of globalisation on the requirements for modern forms of authentication.

Highlights

  • As noted in [1], at the end of the 20th century, globalisation became the motto for the international economy

  • The term biometric authentication is often considered synonymous with biometric recognition, which is defined as biometrics automated recognition of individuals based on their biological and behavioural characteristics [3]

  • Rapid developments in information technology and the increase in security risks on a global scale are leading to efforts to improve the reliability of hand-based biometric systems

Read more

Summary

Introduction

As noted in [1], at the end of the 20th century, globalisation became the motto for the international economy. The division of global threats can be as follows [2]: x Economic risks (fiscal crises, extreme energy price volatility, global imbalance and currency volatility, regulatory failures); x Geopolitical risks (global governance failures, fragile states, geopolitical conflict, terrorism, organised crime, corruption, illicit trade); x Environmental risks (climate change, biodiversity loss, flooding, storms and cyclones, air pollution); x Societal risks (economic disparity, demographic challenges, migration, water and food security, infectious diseases); x Technological risks (online data and information security, critical information infrastructure breakdown, threats from new technologies). The basic requirements for secure information are to ensure its confidentiality, integrity and availability of data (CIA). The requirement of confidentiality of information means that only authorised persons have access to the information. This can be done by subject authentication. There are different types of authentication: x Knowledge authentication (password, PIN) x Authentication using an authentication object (magnetic card) x Biometric authentication (fingerprint, iris, walking)

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.