Computer Technology

Unsophisticated biometric systems are already available at relatively affordable prices but they are unsuitable for many sensitive assets and applications. Sufficiently sophisticated biometrics systems to safeguard highly sensitive assets and information systems are comparatively cost prohibitive for small and medium-sized business entities (Mills & Byun, 2006).

For example, fingerprint biometric identification systems are perfectly appropriate for low-level information systems and assets, particularly where those systems are used I conjunction with highly-trafficked areas that preclude extended private access. However, the same biometrics measures are insufficient in conjunction with low-traffic areas that permit potential intruders extended opportunities to work on bypassing the system without their efforts being observed or discovered. That is simply a function of the proven ability of forged fingerprints reproduced onto a synthetic film placed over the infiltrators finger.

Ultimately, biometrics offers enhanced security, but sensitive national security assets require very careful consideration of the entire risk matrix in connection with the specific vulnerabilities of those assets and any biometric systems intended to secure them.


Bulkeley, W. (2006). How Biometric Security Is Far From Foolproof: Systems Holes Spur Efforts to Improve Limitations; the Gummy Bear Deception. The Wall Street Journal, December 21, 2006 (p. B 3).

Busch, C. (2006). EMBO Reports: Facing the Future of Biometrics. European Molecular Biology Organization, Vol. 7.

Hamilton, W. (2007). Will Biometric Authentication Solve Corporate Security Challenges? Optimize, Vol. 6, No. 2.

Larsen, R. (2007) Our Own Worst Enemy: Asking the Right Questions About Security to Protect You, Your Family, and America. New York: Grand Central.


leave a Comment