• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech Guide
  • Home Improvement
  • Gadget & Apps
  • News

Behavioral biometrics could be the future of security when all else fails

Updated on Dec 8, 2015 by Guest Authors

The one undeniable fact in the current computer security landscape is that existing security measures do not hold a lasting solution to the ever expanding threat landscape.

For example, passwords have been rendered insecure in recent years because of the ease with which to crack them, especially those passwords with very uncomplicated characters. Also, the touted two-factor authentication has seen an increase in attempts at breaching them, with a focus on weak points of the measure.

This has led security experts both in the private sector and government to conclude that the next frontier of computer security might lie in behavioral biometrics, something that identifies the users themselves.

behavioral-biometrics

The U.S. Defense Advanced Research Projects Agency is one such government agency that has begun to test behavioral biometrics under its Active Authentication program.

This does not mean, however, that a multi-factor authentication scheme is completely useless. In fact, behavioral biometrics makes use of several factors to constitute a single and integrated security tool. But the push for multi-factor solutions to security has always encountered resistance from some users themselves despite the efforts of its proponents to avoid disrupting user experience.

Still, some users find it disruptive that they are being forced to transition to the new ways of protecting one’s identity online. For instance, some would like to stick with the use of passwords for online transactions and activities while many security experts have declared the scheme old-fashioned.

The idea behind behavioral biometrics is innovative and more secure. While the traditional two-factor verification and passwords seem to disregard the later phases of an attack as it happens and no longer detects the malicious activity inside a network, behavioral biometrics offers a continuous process of verification inside a network.

Once an attacker has gained access to a network, a password or two-factor authentication would not be able to spot on the activity. But with behavioral biometrics, the cyber criminal will always be detected even as the malicious attack has already occurred.

According to DARPA, a multifactor authentication or passwords will be rendered useless once they are compromised because they are designed to protect only the front door of security, not the insides of a network. That is why cyber attackers will be able to gain an extended control over a network once inside.

Behavioral biometrics will shift the focus from the traditional network perimeter and endpoint to continued monitoring using a tool called adaptive authentication. This tool works to flag users inside a network based on several factors that will be compared against pre-determined behavior of the legit users. A security alert will be raised once abnormalities in behavior are detected.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Makeblock mBot Ranger Review – Learn Scratch Coding with the Robot Kit

Apitor Robot S Review – A Perfect LEGO SPIKE Alternative For Scratch Programming

EPOMAKER CIDOO V65 V2 Wireless Mechanical Keyboard Review

VTOMAN FlashSpeed 1500 Portable Power Station Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Free Places To Sleep Inside Hong Kong Airport During Long Transits
  • Exploring the WAINLUX K8: A User-Friendly, Fully Enclosed Laser Engraver
  • KOKONI EC2 App-Controlled 3D Printer: Revolutionizing 3D Printing at Home and Beyond
  • Makeblock mBot Ranger Review – Learn Scratch Coding with the Robot Kit

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}