September 20, 2017

Authentication rank survey



< Infosecurity - Facial Recognition Rated Far More Ineffective Than Touch ID by Hackers(Link) >


※ 3-line summary
❑ According to the survey targeting hackers, password-protected documents is worst tool for authentication and the second is facial recognition.
❑ Phishing is the best data exfiltration strategy and the second is malware/ransomware.
❑ Unmanaged devices is the IT's largest blind spot and the second is applications and programs not updated.


>>>
Face recognition technology is advanced technology, but there are some problems of face recognition at present.
1. The low resolution like CCTV makes it hard to find real persons such as criminals.
2. High resolution photos can unlock the system lock.

It is possible to filter pictures with no face movement, light reflection of a flat picture, 3D sensor, etc. However high cost is a weakness. Also Fingerprint photographs are difficult to be stolen, but face photographs are easy to be stolen, so much research is needed until it used to lock the main system.