SlideShare une entreprise Scribd logo
1  sur  22
Security Audit in  UID Biometric System
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What  is  UID? Is an ambitious project initiated by government of India to give each Indian  Resident  a  Unique ID (UID) Number  that can establish their identity at any place, any time.
Key  features  of UID ,[object Object],[object Object],[object Object]
Key  features  of UID Cont… ,[object Object],[object Object],[object Object]
Key Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Challenges
UID Agencies
UID Process Workflow
[object Object],[object Object],[object Object],[object Object],[object Object],UID & Biometrics
Typical Biometric System  Functions Enrollment Data acquisition Transmission Signal Processing Decision Data Storage Matching
Risks and vulnerabilities  in the system
Threats and Counter Measures Location Threats Counter measures Data collection Spoofing Multimodal biometrics Device substitution Have authenticated, trusted devices Raw data transmission Reading/modification of data Sign in data, have session tokens Signal processing Component replacements Have digitally signed components and check integrity of the software Matching Manipulation of match scores Don’t allow processes to be running that introspect data and results coming back Hill Climbing Don’t provide detailed scoring data back to any 3 rd  party Storage Database compromise  Have database access controls, Sign and encrypt templates and store keys in a separate hardware Decision Threshold manipulation Protected function, data protection
Audit checkpoints for biometric system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit checkpoints for biometric system
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit checkpoints for biometric system
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit checkpoints for biometric system
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Audit checkpoints for biometric system
Summary   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusion   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

Contenu connexe

Tendances

BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIAchandu namani
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7EAE
 
Umer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting SystemIRJET Journal
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)NCTechSymposium
 
18 16108 paper 089 ijeecs(edit)
18 16108 paper 089 ijeecs(edit)18 16108 paper 089 ijeecs(edit)
18 16108 paper 089 ijeecs(edit)IAESIJEECS
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comMcdonaldRyan80
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnDavid Fletcher
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar promaproma_goswami
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql databasegourav kottawar
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprisehardik soni
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET Journal
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.comBaileyaby
 

Tendances (20)

BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7Introduccion a la seguridad Windows 7
Introduccion a la seguridad Windows 7
 
Umer Khalid Thesis Abstract
Umer Khalid Thesis AbstractUmer Khalid Thesis Abstract
Umer Khalid Thesis Abstract
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
Info Security & PCI(original)
Info Security & PCI(original)Info Security & PCI(original)
Info Security & PCI(original)
 
18 16108 paper 089 ijeecs(edit)
18 16108 paper 089 ijeecs(edit)18 16108 paper 089 ijeecs(edit)
18 16108 paper 089 ijeecs(edit)
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
Utah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-OnUtah Architecture Review Single Sign-On
Utah Architecture Review Single Sign-On
 
Policy and procedure
Policy and procedurePolicy and procedure
Policy and procedure
 
Biometric seminar proma
Biometric seminar promaBiometric seminar proma
Biometric seminar proma
 
security and privacy in dbms and in sql database
security and privacy in dbms and in sql databasesecurity and privacy in dbms and in sql database
security and privacy in dbms and in sql database
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
IRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using BlockchainIRJET - Health Record Transaction in Hospital Management using Blockchain
IRJET - Health Record Transaction in Hospital Management using Blockchain
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 

En vedette

Unique Identification Number database simulation project report
Unique Identification Number database simulation project reportUnique Identification Number database simulation project report
Unique Identification Number database simulation project reportRachit Mishra
 
Unique Identification_Public Distribution System(UID_PDS)
Unique Identification_Public Distribution System(UID_PDS)Unique Identification_Public Distribution System(UID_PDS)
Unique Identification_Public Distribution System(UID_PDS)Himanshu Ghughtyal
 
E ticket to channel success
E ticket to channel successE ticket to channel success
E ticket to channel successKen Beam
 
Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020
Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020
Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020Masabi
 
Braking system
Braking systemBraking system
Braking systemAk355
 
E-TICKETING ON RAILWAY TICKET RESERVATION
E-TICKETING ON RAILWAY TICKET RESERVATIONE-TICKETING ON RAILWAY TICKET RESERVATION
E-TICKETING ON RAILWAY TICKET RESERVATIONNandana Priyanka Eluri
 
Regenerative braking Project report
Regenerative braking Project reportRegenerative braking Project report
Regenerative braking Project reportDeepak kango
 
IR Sensor Working and Concepts
IR Sensor Working and ConceptsIR Sensor Working and Concepts
IR Sensor Working and ConceptsRobo India
 
Regenerative braking system
Regenerative braking systemRegenerative braking system
Regenerative braking systemRohit Nair
 
Regenerative braking system
Regenerative braking systemRegenerative braking system
Regenerative braking systemSuchit Moon
 
Infrared IR Sensor Circuit Diagram and Working Principle
Infrared IR Sensor Circuit Diagram and Working PrincipleInfrared IR Sensor Circuit Diagram and Working Principle
Infrared IR Sensor Circuit Diagram and Working Principleelprocus
 
Fabrication of Prototype Model of Infrared Sensor Based Regenerative Braking...
Fabrication of Prototype Model of Infrared Sensor Based  Regenerative Braking...Fabrication of Prototype Model of Infrared Sensor Based  Regenerative Braking...
Fabrication of Prototype Model of Infrared Sensor Based Regenerative Braking...IJMER
 
E-Ticket presentation
E-Ticket presentationE-Ticket presentation
E-Ticket presentationSergio Santos
 

En vedette (17)

Unique Identification Number database simulation project report
Unique Identification Number database simulation project reportUnique Identification Number database simulation project report
Unique Identification Number database simulation project report
 
Unique Identification_Public Distribution System(UID_PDS)
Unique Identification_Public Distribution System(UID_PDS)Unique Identification_Public Distribution System(UID_PDS)
Unique Identification_Public Distribution System(UID_PDS)
 
E ticket to channel success
E ticket to channel successE ticket to channel success
E ticket to channel success
 
Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020
Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020
Self-Service e-Ticketing on Self-Print and Mobile - given at Travel2020
 
Braking system
Braking systemBraking system
Braking system
 
E-TICKETING ON RAILWAY TICKET RESERVATION
E-TICKETING ON RAILWAY TICKET RESERVATIONE-TICKETING ON RAILWAY TICKET RESERVATION
E-TICKETING ON RAILWAY TICKET RESERVATION
 
Regenerative braking Project report
Regenerative braking Project reportRegenerative braking Project report
Regenerative braking Project report
 
Regenerative braking
Regenerative brakingRegenerative braking
Regenerative braking
 
E-Ticketing
E-TicketingE-Ticketing
E-Ticketing
 
IR Sensor Working and Concepts
IR Sensor Working and ConceptsIR Sensor Working and Concepts
IR Sensor Working and Concepts
 
Uid
UidUid
Uid
 
Regenerative braking system
Regenerative braking systemRegenerative braking system
Regenerative braking system
 
Regenerative braking system
Regenerative braking systemRegenerative braking system
Regenerative braking system
 
Regenerative braking system
Regenerative braking system Regenerative braking system
Regenerative braking system
 
Infrared IR Sensor Circuit Diagram and Working Principle
Infrared IR Sensor Circuit Diagram and Working PrincipleInfrared IR Sensor Circuit Diagram and Working Principle
Infrared IR Sensor Circuit Diagram and Working Principle
 
Fabrication of Prototype Model of Infrared Sensor Based Regenerative Braking...
Fabrication of Prototype Model of Infrared Sensor Based  Regenerative Braking...Fabrication of Prototype Model of Infrared Sensor Based  Regenerative Braking...
Fabrication of Prototype Model of Infrared Sensor Based Regenerative Braking...
 
E-Ticket presentation
E-Ticket presentationE-Ticket presentation
E-Ticket presentation
 

Similaire à Uid security

Enhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control SystemsEnhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control SystemsStar Link Communication Pvt Ltd
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPIRJET Journal
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06gbroadbent67
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login SessionIRJET Journal
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3DigitalPersona
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniquesSubhash Basistha
 
Biometrics
BiometricsBiometrics
Biometricssenejug
 
Effective testing for a critical component of Government of India's unique id...
Effective testing for a critical component of Government of India's unique id...Effective testing for a critical component of Government of India's unique id...
Effective testing for a critical component of Government of India's unique id...Mindtree Ltd.
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Frameworkssuser65fa31
 
3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...
3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...
3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...Brihaspathi Technologies Pvt. Ltd.
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsGanbayar Sukhbaatar
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 

Similaire à Uid security (20)

BSI Biometrics Standards Presentation
BSI Biometrics Standards PresentationBSI Biometrics Standards Presentation
BSI Biometrics Standards Presentation
 
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control SystemsEnhancing Security and Efficiency The Power of Biometric Access Control Systems
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTPVIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
VIRTUAL VOTING SYSTEM USING FACE RECOGNITION AND OTP
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Biometrics and authentication webinar v3
Biometrics and authentication webinar v3Biometrics and authentication webinar v3
Biometrics and authentication webinar v3
 
CS-1,2.pdf
CS-1,2.pdfCS-1,2.pdf
CS-1,2.pdf
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Biometrics
BiometricsBiometrics
Biometrics
 
Broken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptxBroken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptx
 
Effective testing for a critical component of Government of India's unique id...
Effective testing for a critical component of Government of India's unique id...Effective testing for a critical component of Government of India's unique id...
Effective testing for a critical component of Government of India's unique id...
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Information Security Framework
Information Security FrameworkInformation Security Framework
Information Security Framework
 
3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...
3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...
3 Must-Have Components for a Successful Aadhar Enabled Biometric Attendance D...
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Uid security

  • 1. Security Audit in UID Biometric System
  • 2.
  • 3. What is UID? Is an ambitious project initiated by government of India to give each Indian Resident a Unique ID (UID) Number that can establish their identity at any place, any time.
  • 4.
  • 5.
  • 6.
  • 7.
  • 10.
  • 11. Typical Biometric System Functions Enrollment Data acquisition Transmission Signal Processing Decision Data Storage Matching
  • 12. Risks and vulnerabilities in the system
  • 13. Threats and Counter Measures Location Threats Counter measures Data collection Spoofing Multimodal biometrics Device substitution Have authenticated, trusted devices Raw data transmission Reading/modification of data Sign in data, have session tokens Signal processing Component replacements Have digitally signed components and check integrity of the software Matching Manipulation of match scores Don’t allow processes to be running that introspect data and results coming back Hill Climbing Don’t provide detailed scoring data back to any 3 rd party Storage Database compromise Have database access controls, Sign and encrypt templates and store keys in a separate hardware Decision Threshold manipulation Protected function, data protection
  • 14.
  • 15.  
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.  

Notes de l'éditeur

  1. Headed by a popular IT(Information Technology) Figure Mr. Nandan Nilekani as Chairman, whose rank is equal Cabinet Minister of Central Government. UID is a unique 16 digit number that is assigned to each individual in our billion-plus population, which will be used to identify the person for all interactions he or she will have with any public body, regulatory authority or law-enforcement agency. The UID along with the biometric data, will serve as a conclusive proof of identity across India, making it unnecessary for any citizen to carry multiple documentation from a variety of government agencies. It can be used while traveling, opening a bank account, getting a telephone connection, voting in elections and so on The Government hopes one immediate benefit will be the war on terror, with infiltrators and others finding it much harder to move around. People below the poverty line will find UID easier access to welfare schemes for their benefit, and not to find such aid diverted to those not entitled to them
  2. Headed by a popular IT(Information Technology) Figure Mr. Nandan Nilekani as Chairman, whose rank is equal Cabinet Minister of Central Government. UID is a unique 16 digit number that is assigned to each individual in our billion-plus population, which will be used to identify the person for all interactions he or she will have with any public body, regulatory authority or law-enforcement agency. The UID along with the biometric data, will serve as a conclusive proof of identity across India, making it unnecessary for any citizen to carry multiple documentation from a variety of government agencies. It can be used while traveling, opening a bank account, getting a telephone connection, voting in elections and so on The Government hopes one immediate benefit will be the war on terror, with infiltrators and others finding it much harder to move around. People below the poverty line will find UID easier access to welfare schemes for their benefit, and not to find such aid diverted to those not entitled to them
  3. Headed by a popular IT(Information Technology) Figure Mr. Nandan Nilekani as Chairman, whose rank is equal Cabinet Minister of Central Government. UID is a unique 16 digit number that is assigned to each individual in our billion-plus population, which will be used to identify the person for all interactions he or she will have with any public body, regulatory authority or law-enforcement agency. The UID along with the biometric data, will serve as a conclusive proof of identity across India, making it unnecessary for any citizen to carry multiple documentation from a variety of government agencies. It can be used while traveling, opening a bank account, getting a telephone connection, voting in elections and so on The Government hopes one immediate benefit will be the war on terror, with infiltrators and others finding it much harder to move around. People below the poverty line will find UID easier access to welfare schemes for their benefit, and not to find such aid diverted to those not entitled to them
  4. Headed by a popular IT(Information Technology) Figure Mr. Nandan Nilekani as Chairman, whose rank is equal Cabinet Minister of Central Government. UID is a unique 16 digit number that is assigned to each individual in our billion-plus population, which will be used to identify the person for all interactions he or she will have with any public body, regulatory authority or law-enforcement agency. The UID along with the biometric data, will serve as a conclusive proof of identity across India, making it unnecessary for any citizen to carry multiple documentation from a variety of government agencies. It can be used while traveling, opening a bank account, getting a telephone connection, voting in elections and so on The Government hopes one immediate benefit will be the war on terror, with infiltrators and others finding it much harder to move around. People below the poverty line will find UID easier access to welfare schemes for their benefit, and not to find such aid diverted to those not entitled to them
  5. Vulnerabilities Data collection Signal processing Data storage Matching Decission
  6. Vulnerabilities Data collection Signal processing Data storage Matching Decission
  7. The following are used as performance metrics for biometric systems:[3] false accept rate or false match rate (FAR or FMR) – the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. false reject rate or false non-match rate (FRR or FNMR) – the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percent of valid inputs which are incorrectly rejected. receiver operating characteristic or relative operating characteristic (ROC) – The ROC plot is a visual characterization of the trade-off between the FAR and the FRR. In general, the matching algorithm performs a decision based on a threshold which determines how close to a template the input needs to be for it to be considered a match. If the threshold is reduced, there will be less false non-matches but more false accepts. Correspondingly, a higher threshold will reduce the FAR but increase the FRR. A common variation is the Detection error trade-off (DET), which is obtained using normal deviate scales on both axes. This more linear graph illuminates the differences for higher performances (rarer errors). equal error rate or crossover error rate (EER or CER) – the rate at which both accept and reject errors are equal. The value of the EER can be easily obtained from the ROC curve. The EER is a quick way to compare the accuarcy of devices with different ROC curves. In general, the device with the lowest EER is most accurate. Obtained from the ROC plot by taking the point where FAR and FRR have the same value. The lower the EER, the more accurate the system is considered to be. failure to enroll rate (FTE or FER) – the rate at which attempts to create a template from an input is unsuccessful. This is most commonly caused by low quality inputs. failure to capture rate (FTC) – Within automatic systems, the p include all all are related to biometrics and can be imp to be mentioned
  8. The following are used as performance metrics for biometric systems:[3] false accept rate or false match rate (FAR or FMR) – the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. false reject rate or false non-match rate (FRR or FNMR) – the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percent of valid inputs which are incorrectly rejected. receiver operating characteristic or relative operating characteristic (ROC) – The ROC plot is a visual characterization of the trade-off between the FAR and the FRR. In general, the matching algorithm performs a decision based on a threshold which determines how close to a template the input needs to be for it to be considered a match. If the threshold is reduced, there will be less false non-matches but more false accepts. Correspondingly, a higher threshold will reduce the FAR but increase the FRR. A common variation is the Detection error trade-off (DET), which is obtained using normal deviate scales on both axes. This more linear graph illuminates the differences for higher performances (rarer errors). equal error rate or crossover error rate (EER or CER) – the rate at which both accept and reject errors are equal. The value of the EER can be easily obtained from the ROC curve. The EER is a quick way to compare the accuarcy of devices with different ROC curves. In general, the device with the lowest EER is most accurate. Obtained from the ROC plot by taking the point where FAR and FRR have the same value. The lower the EER, the more accurate the system is considered to be. failure to enroll rate (FTE or FER) – the rate at which attempts to create a template from an input is unsuccessful. This is most commonly caused by low quality inputs. failure to capture rate (FTC) – Within automatic systems, the p include all all are related to biometrics and can be imp to be mentioned