Voice Biometric : A New Trend to Enhance Security

2017 ◽  
Vol 12 (01) ◽  
Author(s):  
Nupur Gupta

Security has always been a primary concern whether be it home or office. With the advent of information technology security over the information acquired takes a prime concern. Security breaches are prevailing from technical to business field. Information technology has inundated the business sector and education world and every possible area one can think of. Consider the case of CERT-I n where, Hours ahead of its planned protest against certain incidents of internet censorship in India , hacker collective Anonymous attacked and brought down the website run by Computer Emergency Response Team India (CERT-I n). Amongst the most disastrous information leakage breach was the hacking of data for 1.5 million Master and VISA card users. VISA and MASTER card alerts banks about the security breach at Global Payments. The alert clearly stated that full Track 1 and Track 2 information was taken and could have been abused for counterfeit new cards. This information had been compromised from a period of January 21,2012 to February 25,2012. Yet it was not the company who disclosed the security breach, the security blogger Brian Krebs in security reported the event on 30,March,2012, This pattern is common for all security breaches as the conclusion who are impacted are the last ones to know about it. These threats to business need a stronger mechanism of security to counter them. Biometrics has offered new venues to resolve these issues. Biometrics refers to the physiological or behavioural characteristics of a person to authenticate his/her identity. This Biometrics is the most prominent and promising technique used for authenticating a person’s identity. Voice Biometrics, Finger printing, facial Recognition area few biometrics that are used for security purposes. This paper majorly cover Voice Biometrics. voice biometrics uses the pitch, tone, and rhythm of speech. Background noise, illness, age, and differences in telephones and microphones can cause problems with voice identification and authorization.[Paper: exploration - voice - biometrics_1436] This is mostly used by Banks and Call Centres to authenticate there users. A telephone or microphone is required to proved your identity. Voice Biometrics is mostly adopted by the customers as they find it as a normal telephonic conversation. Remotely any customer from any location can login or use his/her ID. Each person has a unique voice and that can be easily stored in form of bits. So, this provide a better option for the developer or programmers to authenticate their software, databases etc using Voice Biometrics. Number of methods are used to apply these Biometrics. As a first step the new user has to record his/her speech by calling a telephone collection script. Once there is an existent recording the user is allowed to invoke an enrolment form and specify personal data, such as passwords and answers to questions on various topics, as suggested by the server. The answers can be selections from predetermined value lists, e.g. selected cities or colours, or user’s own new keywords. It is also possible to add new questions within the existent topics or dynamically generate these based on contexts or history of previous transactions or other events.

Author(s):  
Don Kerr ◽  
John G. Gammack ◽  
Richard Boddington

This chapter provides an overview of digital business security. It is informed by a contemporary analysis of perceived threats through the eyes of information technology managers both from a representative public institution (a University) and from a private company (a retail sales company). A brief overview of malicious software leads into more general consideration of the risks and threats of security breaches, which are analysed from both a company and a customer perspective. Common to both sectors is the requirement to secure corporate records and other digital information and management and policy guidance is provided here. Cybercrime remains rife, but is both under-reported and under-prosecuted. As managers may become involved in legal issues associated with information technology security breaches, this chapter also overviews the special nature of digital evidence.


Author(s):  
Ian J. Lloyd

Information Technology Law provides a thorough account of information technology (IT) law. The volume looks at the subject in a wide context, examining the legal response to the latest IT-related developments within society, bringing the law to life and examining how legal issues in IT can affect everyone. This title considers issues in IT law on European and international scales, providing a realistic overview of how the law in this area operates globally and encouraging further thought and investigation about the current issues within IT law. The eighth edition covers major new legislation in this field, including the Investigatory Powers Bill and its proposed impact and scope; the rise in online fraud in the context of the Computer Misuse Act; discussion of personal data in the light of recent high-profile security breaches and new EU directives; new legislation introduced in response to the issue of revenge pornography; updated coverage of patent law, copy protection, and digital rights management; discussion of the Consumer Rights Act 2015 with regards to digital products and content; and consideration of new cases in all areas of the law.


Author(s):  
Oleksandr Malashko ◽  

The article reveals the conceptual foundations of the policy and system for ensuring information security in the countries of Central Europe, in particular in Germany, Poland, Hungary and Croatia. It was found that Germany, Poland, Hungary and Croatia are member countries of the European Union and NATO, therefore they are subject to the rules and standards of these international organizations. It was established that the main documents and programs for ensuring information security and cybersecurity in the EU and NATO member states are: Document C-M (2002) 49 “Security in the North Atlantic Treaty Organization (NATO)”, the Cybersecurity Concept, formulated based on the results of the Lisbon Summit, the Concept cybersecurity, formulated as a result of the Warsaw Summit, “European Criteria for Information Technology Security”, “Common Criteria for Information Technology Security”, “Network and Information Security: a European Political Approach”, “Safe Internet”, “Towards a Common Policy in the Field of Combating cybercrime”,“Protecting Europe from large-scale cyber attacks and disruption: strengthening preparedness, security and resilience”, Directive 95/46 / EU “On the protection of individuals in the context of the processing of personal data and the free circulation of such data ”. It was determined that in Germany the policy and system for ensuring information security and cybersecurity is based on the Law “On Security Inspection”, the “Act for the Protection of Information in Telecommunications”, the “Act on Freedom of Information”, and the Law “On Strengthening the Security of Information Systems”. It was established that in Poland the policy and system for ensuring information security and cybersecurity is based on the Law “On Mail”, the Law “On Television and Radio Broadcasting”, the Law “On State Relations with the Roman Catholic Church in the Republic of Poland”, the Cybersecurity Strategy of Poland, the Doctrine of Cybersecurity Poland, Poland's Information Security Doctrine. It has been established that in Hungary the policy and system for ensuring information security and cybersecurity is based on the Law “On the Protection of Information about a Person and Access to Information of Public Interest”, the Law “On the Right to Information Self-Determination and Freedom of Information”, the Law “On Processing and Protection medical information and related personal data”, “Act on Electronic Information Security of State and Municipal Bodies”, Hungarian National Security Strategy, Hungarian National Cybersecurity Strategy. It was determined that in Croatia the policy and system for ensuring information security and cyber security is based on the “Information Security Act” and the National Cyber Security Strategy. It has been proved that Ukraine, which has chosen the course of European integration, should be guided by a number of information security strategies identified in the member states of the European Union, in particular in Germany, Poland, Hungary and Croatia.


Sign in / Sign up

Export Citation Format

Share Document