0% found this document useful (0 votes)
18 views5 pages

Biometric Protection Methods in Information Security

Today, modern information security and cyber security are aimed at reducing the risks for this strong security solution: traditional passwords have long been a weak point for security systems. Biometrics aims to answer this question by connecting the identification of the person with our body and behavior. https://openaccessjournals.eu/index.php/jedic/article/view/2076/1972 https://openaccessjournals.eu/index.php/jedic/article/view/2076
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views5 pages

Biometric Protection Methods in Information Security

Today, modern information security and cyber security are aimed at reducing the risks for this strong security solution: traditional passwords have long been a weak point for security systems. Biometrics aims to answer this question by connecting the identification of the person with our body and behavior. https://openaccessjournals.eu/index.php/jedic/article/view/2076/1972 https://openaccessjournals.eu/index.php/jedic/article/view/2076
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Journal of Ethics and Diversity in

International Communication
| e-ISSN: 2792-4017 | www.openaccessjournals.eu | Volume: 3 Issue: 4

Biometric Protection Methods in Information Security


Xayitov Azizjon Mo‘minjon o‘g‘li
Assistant, Department of Intelligent Engineering Systems, Fergana Polytechnic Institute, Fergana,
Uzbekistan

Annotatsiya: Today, modern information security and cyber security are aimed at reducing the
risks for this strong security solution: traditional passwords have long been a weak point for
security systems. Biometrics aims to answer this question by connecting the identification of the
person with our body and behavior. In the current era of information exchange, the requirements
for information security are high, including ensuring the security of systems by implementing
biometric authentication of biological features.
Keywords: biometric, biological biometric, biometric security, biometric authentication, biometric
identification information systems, users of information systems.

Biometrics is emerging as a leading edge for many personal and corporate security systems in data
protection. It may seem unbelievable that you and everyone else have different biological and
behavioral identities with unique identities. However, biometric identification has a high potential
for many to use it as a stand-alone authentication.
In this article, we explore the basics of how to use biometric security to store information in cyber
security. To implement these plans, we answer biometric questions: What does biometric mean?
What is biometric data? What is a biometric scanner? What are the risks of biometric security?
How can we make biometrics more secure?
What is biometrics? Biometrics are biological measurements—or physical characteristics—that
can be used to identify individuals. For example, fingerprint mapping, facial recognition, and
retinal scanning are all forms of biometric technology, but these are the most recognized options.
Researchers have identified the shape of the ear, the way a person sits and walks, unique body
odors, veins in the hands, and even facial folds are other unique identifiers. These features further
identify biometrics, which increases the level of security.
Three Types of Biometric Security: Although these can have other applications, biometrics are
often used for security, and you can basically categorize biometrics into three groups:
 Biological biometrics
 Morphological biometrics
 Behavioral biometrics
Biological biometrics are used at the genetic and molecular level. These may include
characteristics such as your DNA or blood, which can be assessed through a sample of your body
fluids. Morphological biometrics includes the structure of your body. More physical features such
as eyes, fingerprints or the shape of your face can be mapped for use with security scanners.
Behavioral biometrics are based on patterns that are unique to each individual. How you walk,
talk, or even type on the keyboard can reveal your personality if these patterns are observed.
Biometric Security Jobs: The role of biometric identification in our everyday security is
increasing. Physical characteristics are relatively fixed and individual - even with twins. Each
Published under an exclusive license by open access journals under Volume: 3 Issue: 4 in Apr-2023
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/

62
Journal of Ethics and Diversity in
International Communication
| e-ISSN: 2792-4017 | www.openaccessjournals.eu | Volume: 3 Issue: 4
person's unique biometric identity can be used to replace or at least augment password systems for
computers, phones, and access-restricted rooms and buildings. Once biometric data is captured and
mapped, it is stored for comparison with subsequent access attempts. Often this data is encrypted
and stored inside the device or on a remote server. In other words, biometric security means that
your body is the "key" to unlock access.
Biometrics are mainly used because of two main advantages:
 Ease of use: Biometrics are always with you and cannot be lost or forgotten.
 Hard to steal or impersonate: Biometrics cannot be stolen like passwords or keys. While these
systems aren't perfect, they hold tons of promise for the future of cybersecurity.
Some overviews of biometric security:
 Voice recognition
 Fingerprint scan
 Recognize the face
 Recognition of Iris
 Heart rate sensors
In practice, biometric security has been effectively used in many fields. Complex biometric data is
used to protect confidential documents and valuables. Citibank already uses voice recognition, and
Britain's Halifax Bank is testing heartbeat devices to verify customers' identities. Ford is even
considering installing biometric sensors in cars.
Biometric data is included in electronic passports around the world. In the United States, electronic
passports contain a chip containing a digital photograph of a person's face, fingerprint, or iris, as
well as technology that prevents unauthorized data readers from reading the chip and erasing the
data. As these security systems are developed, we are seeing the pros and cons in real time.
Biometrics - identification and privacy issues. Biometric authentication is convenient, but
privacy advocates fear that biometric security undermines privacy. The concern is that personal
information can be collected easily and without consent.
Facial recognition is part of everyday life in Chinese cities, where it is used for simple purchases,
and London is famous for its CCTV cameras. New York, Chicago and Moscow are now linking
their cities' CCTV cameras to facial recognition databases to help local police fight crime.
Advancing the technology, Carnegie Mellon University is developing a camera that can scan the
irises of people in a crowd from a distance of 10 meters. In 2018, a facial recognition system was
introduced at Dubai Airport, where travelers are photographed by 80 cameras as they pass through
a tunnel in a virtual aquarium. Facial recognition cameras are also available at other airports around
the world, including Helsinki, Amsterdam, Minneapolis-St. Paul and Tampa. All this data must be
stored in one place, which increases the fear of constant surveillance and data misuse.
Ways to protect biometric identification: With privacy and security risks, biometric systems
must use additional safeguards. If systems require multiple means of authentication, such as life
detection (e.g. blinking) and matching coded patterns to users within encrypted domains,
unauthorized access becomes difficult.vSome security systems also include additional features such
as age, gender, and height to biometric information to deter hackers. Biometric information is a
good replacement for usernames as part of a two-factor authentication strategy.

Published under an exclusive license by open access journals under Volume: 3 Issue: 4 in Apr-2023
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/

63
Journal of Ethics and Diversity in
International Communication
| e-ISSN: 2792-4017 | www.openaccessjournals.eu | Volume: 3 Issue: 4
Two-factor authentication makes for a powerful combination, especially as IoT devices proliferate.
By increasing the level of protection, secure internet devices are less vulnerable to data breaches.
Additionally, using a password manager to store any traditional passwords can give you extra
protection.
Biometrics continues to be a growing method of identity verification for cybersecurity systems.
Protecting your physical or behavioral signatures in combination with other authentications
provides the strongest security known. At the moment, this is at least better than using a character-
based password as a stand-alone verification. Biometric technology offers very attractive solutions
for security. Despite the risks, the systems are convenient and difficult to replicate. Moreover, these
systems will continue to evolve for a very long time in the future.
References:
1. Ogli K. A. M. MODERN PROGRAMMING LANGUAGES: CLASSIFICATION AND
CHARACTERIZATION //International Journal of Advance Scientific Research. – 2022. – Т. 2.
– №. 11. – С. 108-111.
2. Azizjon Mo'minjon o'g X. et al. The Importance of Mathematical Game and Methods in the
Formation of Mathematical Concepts in Primary Schools //Journal of Pedagogical Inventions
and Practices. – 2022. – Т. 8. – С. 208-211.
3. Холматов А. А. У., Хайитов А. М. Ў. ИЗУЧИТЬ И ИЗУЧИТЬ СВОЙСТВА БАРИЯ И
СТРОНЦИЯ-ТИТАНА, СИНТЕЗИРОВАННЫХ В БОЛЬШОЙ СОЛНЕЧНОЙ ПЕЧИ
//Oriental renaissance: Innovative, educational, natural and social sciences. – 2021. – Т. 1. – №.
11. – С. 79-93.
4. Azizjon Mo'minjon o'g X. et al. The Importance of Mathematical Game and Methods in the
Formation of Mathematical Concepts in Primary Schools //Journal of Pedagogical Inventions
and Practices. – 2022. – Т. 8. – С. 208-211.
5. Xolmatov A. A., Karimov J. X., Xayitov A. M. Effect of crystallizer catalyst on properties of
glass-crystalline materials //EPRA International Journal of Research and Development (IJRD).
– 2021. – С. 273-275.
6. Каримов Ж. Х., Фозилов И. Р. Управление многостадийными процессами путём
оптимизации глобальных целей системы //Universum: технические науки. – 2020. – №. 3-
1 (72). – С. 16-20.
7. Rakhimovich F. H., Rakhimovich F. I. Periodic Problems of the National Statistical System
//Web of Scholars: Multidimensional Research Journal. – 2022. – Т. 1. – №. 8. – С. 186-189.
8. Rakhimovich F. I., Rakhimovich F. H. The Development of Economic Analysis in Uzbekistan
and Some Features in the Digital Economy //Zien Journal of Social Sciences and Humanities. –
2022. – Т. 7. – С. 110-113.
9. Охунов Д. М., Охунов М. Х., Миноматов Ю. ЭПОХА ЦИФРОВОЙ ЭКОНОМИКИ-
ЭПОХА НОВЫХ ВОЗМОЖНОСТЕЙ И ПЕРСПЕКТИВ ДЛЯ РАЗВИТИЯ БИЗНЕСА НА
ОСНОВЕ ТЕХ¬ НОЛОГИЙ КРАУДСОРСИНГА //International Journal of Contemporary
Scientific and Technical Research. – 2022. – С. 61-65.
10. Avazjono‘g‘li, V. D., & Esonalio‘g‘li, M. Y. (2022). Use and importance of three-dimensional
images in fields. Journal ofEthicsandDiversityin International Communication, 2(2), 1-4.

Published under an exclusive license by open access journals under Volume: 3 Issue: 4 in Apr-2023
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/

64
Journal of Ethics and Diversity in
International Communication
| e-ISSN: 2792-4017 | www.openaccessjournals.eu | Volume: 3 Issue: 4
11. Avazjon o‘g‘li, V. D., & Esonali o‘g‘li, M. Y. (2022). Prospects for the Development of the 3D
Modeling Process. Texas Journal of Engineering and Technology, 7, 78-79.
12. Komiljonovna M. L., Esonali o’g’li M. Y. Adjuster Synthesizing for the Heat Process with
Matlab //Texas Journal of Engineering and Technology. – 2022. – Т. 7. – С. 63-66.
13. Kamiljanovna M. L., Gofurovich T. A. Technology for Manufacturing Working Substances for
Thermoelements Branches and Determination of their Thermoelectric Characteristics //Middle
European Scientific Bulletin. – 2021. – Т. 19. – С. 365-370.
14. Mamadalieva L. K., Minamatov Y. E. High Efficiency of a Photoelectric Converter in a
Combined Design with a Thermoelectric Converter //Middle European Scientific Bulletin. –
2021. – Т. 19. – С. 178-186.
15. Norbutaev M. A. Create Computer Learning Games Taking Into Account the
Psychophysiological Characteristics of the User //International Journal of Development and
Public Policy. – 2022. – Т. 2. – №. 6. – С. 113-116.
16. Uzbekov M. O., Tukhtasinov A. G. Thermal efficiency of a solar air-heating collector with a
metal chip absorber //Journal of Siberian Federal University. Engineering & Technologies. –
2020. – Т. 13. – №. 6. – С. 712-720.
17. Abdullaevich H. E., Karimov J. X. Principles of Development of the Modeling Process //Texas
Journal of Multidisciplinary Studies. – 2022. – Т. 7. – С. 391-393.
18. Каримов Ж. Х. ПРОЦЕДУРЫ ОПТИМИЗАЦИИ ГЛОБАЛЬНЫХ ЦЕЛЕЙ СИСТЕМЫ
УПРАВЛЕНИЯ МНОГОСТАДИЙНЫМИ ПРОЦЕССАМИ //Universum: технические
науки. – 2021. – №. 11-1 (92). – С. 48-52.
19. Okhunov, D. M., Okhunov, M. H., & Minamatov, Y. E. (2023). The Use of Machine Learning
and Neural Networks in the Digital Economy and International Digital Integration. Journal of
Ethics and Diversityin International Communication.
20. Халилов З. Ш. СОВЕРШЕНСТВОВАНИЕ СИСТЕМЫ ОЧИСТКИ ЗЕРНОУБОРОЧНОГО
КОМБАЙНА ПРИ УБОРКЕ ЗЕРНОВЫХ НА СКЛОНАХ //Главный редактор: Ахметов
Сайранбек Махсутович, д-р техн. наук; Заместитель главного редактора: Ахмеднабиев
Расул Магомедович, канд. техн. наук; Члены редакционной коллегии. – 2022. – С. 61.
21. KHALILOV Z. S., MINAMATOV Y. E. U. АКТУАЛЬНЫЕ НАУЧНЫЕ
ИССЛЕДОВАНИЯ В СОВРЕМЕННОМ МИРЕ //АКТУАЛЬНЫЕ НАУЧНЫЕ
ИССЛЕДОВАНИЯ В СОВРЕМЕННОМ МИРЕ Учредители: Общественная организация"
Институт социальной трансформации. – С. 16-19.
22. Esonali o‘g‘li, M. Y. (2022). SURATLARNI SIFATINI YAXSHILASHDA SUN’IY
INTELLEKTNI QO ‘LLASH. BOSHQARUV VA ETIKA QOIDALARI ONLAYN ILMIY
JURNALI, 2(8), 39-41.
23. Olimova O. S. Method of using radio-electronic equipment diagnostics durable systems and
devices for localization of defective elements //Academia Open. – 2022. – Т. 7. – С.
10.21070/acopen. 7.2022. 4721-10.21070/acopen. 7.2022. 4721.
24. Sobirov M. et al. ТЕРМОКОНЦЕНТРАТНИ ХЛОРИД КИСЛОТАЛИ ПАРЧАЛАШ
МАҲСУЛОТИ ВА АММОНИЙ НИТРАТ АСОСИДА NP-ЎҒИТЛАР ОЛИШ //Science and
innovation. – 2022. – Т. 1. – №. A8. – С. 438-445.

Published under an exclusive license by open access journals under Volume: 3 Issue: 4 in Apr-2023
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/

65
Journal of Ethics and Diversity in
International Communication
| e-ISSN: 2792-4017 | www.openaccessjournals.eu | Volume: 3 Issue: 4
25. Axmadaliyevich K. A., Shermuhammad M. Possibilities of getting electricity with the help of a
small solar furnace //EPRA International Journal of Research & Development. – 2021. – Т. 6. –
№. 6. – С. 147-151.
26. Yusupov S., Boyboboev D. ИСПЫТАНИЕ ТОКАРНЫХ СТАНКОВ НА ХОЛОСТОМ
ХОДУ, ПРОВЕРКА РАБОТЫ МЕХАНИЗМОВ ИСПЫТАНИЕ МОО В РАБОТЕ ПОД
НАГРУЗКОЙ И НА ПРОИЗВОДИТЕЛЬНОСТЬ //Science and innovation. – 2022. – Т. 1. –
№. A7. – С. 67-73.
27. Юсупов С. М. Анвархужаев Т. Б. У. Борирование сталей из обмазок для повышения
жаростойкости //Scientific progress. – 2021. – Т. 2. – №. 1. – С. 1445-1448.
28. Khasanboevich, K. J. . . (2023). Analysis of Information Security Issues in Electronic
Document Circulation Systems. Journal of Ethics and Diversity in International
Communication, 3(2), 21–25. Retrieved from
https://openaccessjournals.eu/index.php/jedic/article/view/1829
29. Khasanboevich, K. J. . . (2023). Innovative Technologies in Improving Education. Journal of
Ethics and Diversity in International Communication, 3(2), 26–28. Retrieved from
https://openaccessjournals.eu/index.php/jedic/article/view/1830
30. Abdurasulovich, N. M. . . (2023). Teaching of Specialized Subjects in the Energy Field with the
Support of ICT. Journal of Ethics and Diversity in International Communication, 3(2), 74–78.
Retrieved from https://openaccessjournals.eu/index.php/jedic/article/view/1858

Published under an exclusive license by open access journals under Volume: 3 Issue: 4 in Apr-2023
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/

66

You might also like