
applications and never change it. Compromising a
single password can thus cause a break in security
in many applications. For example, a hacker might
create a bogus Web site enticing users with freebies
if they register with a login name and password.
The hacker could then have a good chance of suc-
cess in using the same login name and password to
attack the users’ corporate accounts.
Strong passwords are difficult to remember. In an
effort to address weak passwords, business ofte n
enforce policies to make passwords strong, for ex-
ample, a business may require that a password is at
least 8 characters long, contains at least one digit and
one special character, and must be changed every
couple of weeks. Such policies backfire. Certainly,
longer complex random passwords are more secure,
but they are so much harder to remember, which
prompts users to write them down in accessible
locations such as Post-It notes hidden under the
keyboard, an unprotected electronic file on their
computer, or other electronic devices such as cellular
phones or personal digital assistants (PDAs), creat-
ing a security vulnerability. Else, people forget their
passwords, which create a financial nightmare to
businesses as they have to employ helpdesk support
staff to reset forgotten or expired passwords. Cryp-
tographic techniques can provide very long pass-
words (encryption keys) that the users need not
remember; however, these are in turn protected by
simple passwords, which defeat their purpose.
Password cracking is scalable. In a pass word-based
network authentication application, a hacker may
launch an attack remotely against all the user
accounts without knowing any of the users. It
costs the hacker almost the same amount of time,
effort, and money to attack millions of accounts as it
costs to attack one. In fact, the same password (for
example, a dictionary word) can be used to launch
an attack against (a dictionary of) user accounts.
Given that a hacker needs to break only one pass-
word among those of all the employees to gain
access to a company’s intranet, a single weak pass-
word compromises the overall security of every sys-
tem that user has access to. Thus, the entire system’s
security is only as good as the weakest password.
Password and tokens do not provide nonrepudiation.
When a user shares a password with a colleague, there
is no way for the system to know who the actual user
is.Similarly,tokenscanbelost,stolen,shared,
duplicated or a hacker could make a master key that
opensmanylocks.Onlybiometricscanprovidea
guarantee of authentication that cannot subsequently
be refused by a user. It is very hard for the user to
deny having accessed a biometric-based system.
Biometrics provide the only credential that does not
rely on the end user to maintain its security. Further-
more, biometric systems are potentially cheaper to
support and easier to use since the end user does not
need to remember complex secrets.
Shrink-wrapped packaged software solutions are
available today to enable the use of biometr ic-based
authentication to logon to virtually any consumer and
enterprise application, including Microsoft Windows
networks, websites, web services, and vir tual private
networks. Since few applications or operating systems
implement native biometric authentication, the role of
many such software solutions is to map a successful
biometric authentication to the user’s long and com-
plex password, which is then used by the application
for logon. The end user, however, will likely not need to
know his or her underlying password or be able to
enter it, and thus, a biometric solution effectively elim-
inates passwords for the user. Similarly, a user’s bio-
metric credential can be bound to the private key
associated with a digital certificate to facilitate di gital
signing of data, such as financial transactions, email,
forms, and documents. In addition, to aid compliance
the system administrator can access an event log to
confirm that a biometric match was performed for
access and whether the match was successful or not.
Fingerprint-based solutions, in particular, have
emerged as the most common method for logical ac-
cess control with biometrics. The use of a fingerprint
requires the user to declare their credential with a
definitive action, such as a finger press or swipe for
authentication. Fingerprint readers have attained the
size, price, and performance necessary to be integrated
in a range of logical access devices, including note-
books, keyboards, mouse, and sm artphones.
It is typical for the logical access control applica-
tions to have only one user per biometric reader, a
reader that may be attached to the user’s PC or embed-
ded in her notebook or smartphone. This is unlike
most other commercial applications such as physical
access control, time and attendan ce, or authentication
at point of sale terminals, where the biometric reader
would be shared among many users. Certain logical
Access Control, Logical
A
3
A