Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Digitally Transforming Trusted Transactions Through Biometrics, ML & AI
Newest First  |  Oldest First  |  Threaded View
Maureen M.
100%
0%
Maureen M.,
User Rank: Apprentice
3/11/2021 | 3:32:48 PM
Biometric Security
Biometrics are only secure if a photo ID is triangulated several ways to reach the highest Identity Assurance Level of IAL3.

Step 1: Both the user's passport and driver's license are used to validate the user's name, date of birth and ensure that photos on both documents are a match. Once validated, an IAL1 score is reached. However, this is not satisfactory enough to make sure that this user actually is who he says he is. Thus, an individual may have stolen both documents and is now attempting to enroll under the name mentioned on the passport and driver's license.

Step 2: The State Department and AAMVA databases (two sources of truth) are queried to check whether either document is valid, lost or stolen. Once validated, a NIST IAL2 score is attained.

Step 3: Do not rest assured that all is in order until you can certify a user has reached an IAL3 score. To that effect, leverage extra sources of truth such as the biometrics chip on the user's passport and a liveness test. The latter consist of the user following a prompt on his mobile application to first blink and then smile. Once validated, the user has reached the highest identity assurance level per the NIST guidelines of IAL3.


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Take me to your BISO 
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23369
PUBLISHED: 2021-05-10
In YzmCMS 5.6, XSS was discovered in member/member_content/init.html via the SRC attribute of an IFRAME element because of using UEditor 1.4.3.3.
CVE-2020-23370
PUBLISHED: 2021-05-10
In YzmCMS 5.6, stored XSS exists via the common/static/plugin/ueditor/1.4.3.3/php/controller.php action parameter, which allows remote attackers to upload a swf file. The swf file can be injected with arbitrary web script or HTML.
CVE-2020-23371
PUBLISHED: 2021-05-10
Cross-site scripting (XSS) vulnerability in static/admin/js/kindeditor/plugins/multiimage/images/swfupload.swf in noneCms v1.3.0 allows remote attackers to inject arbitrary web script or HTML via the movieName parameter.
CVE-2020-23373
PUBLISHED: 2021-05-10
Cross-site scripting (XSS) vulnerability in admin/nav/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.
CVE-2020-23374
PUBLISHED: 2021-05-10
Cross-site scripting (XSS) vulnerability in admin/article/add.html in noneCMS v1.3.0 allows remote authenticated attackers to inject arbitrary web script or HTML via the name parameter.