Biometric Authentication
User authentication is the keystone of information security. Even the most craftily built and diligently monitored computer system will crumble if there is a flaw in its user authentication system(Minaev, 2010). A hacker able to exploit such a flaw will be able to convince the computer system that he is a legitimate user – possibly even a specific legitimate user, entitled to all of the abilities to read or modify that user's data, or implicate that user in misdeeds that could lead to personal or professional harm. A hacker could even impersonate the system administrator herself, giving the hacker the ability to not only access all of that system's data but also to subvert the very same network monitors and automated alerting systems that would notify the real administrator of the hacker's activity(occupytheweb, 2013). This chapter introduces a mechanism that an administrator can use for increasing the strength of a computer's user authentication system and triggering a lockout and/or emailing an alert if an impostor is suspected to be accessing a user's account. It works by measuring the time intervals between keystrokes as a user types, relying on the fact that most individuals have distinct and identifiable typing patterns that can be discerned through statistical analysis.