![]() ![]() Scanners introduced automation to this process. People leave fingerprints everywhere, and police have used fingerprint matching systems for decades. This Section provides a brief summary of three methods for authenticating using biometrics.įingerprint analysis is an age-old method of authentication. For example: fingerprint scans may initiate time clocks to prevent workers from prematurely clocking-in their friends smart speakers could recognize user voices for accurate direction fitness apps monitor heart rate to track user progress and thermal imaging can gauge body temperature to detect symptoms, avoiding a health crisis. This article will introduce methods of authenticating with biometrics, roughly describe the relevant legal landscape, and ultimately suggest a risk-averse approach when using these tools.īiometrics are the measure of an individual’s physical and/or behavioral characteristics. Complexities that Face/Off neglected to address. That heightened security comes with a host of legal issues. Faces, though, are tougher to steal than a username and password.įollowing Face/Off’s logic, companies are relying more on biometric indicators, like a fingerprint or face, to authenticate users for critical applications. Many cyberattacks involve bad guys stealing user credentials (e.g., username and password) to fool applications into allowing unauthorized access to sensitive information. The action in Face/Off is exactly like a cyberattack. It is everything you want in a late 90’s blockbuster. Cage, in the meantime, wakes up to steal Travolta’s unguarded face. Travolta (with Cage’s face) then attempts to fool Cage’s accomplice into disclosing the bomb’s location. Cage’s character plants an explosive and Travolta’s character needs to find it, so the FBI unceremoniously removes Cage’s face while he is unconscious and transplants it onto Travolta’s body. Well, technically, it is about an FBI agent (played by John Travolta) and a terrorist (played by Nicolas Cage) swapping faces. Face/Off is a 1997 Academy Award nominated movie about cybersecurity.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |