What sort of system attacks could result in compromise of sensitive information?
There are three basic ways to defeat a biometric system: System Circumvention, Verification Fraud, and Enrollment Fraud. System Circumvention – avoiding a biometric comparison altogether. The simplest way to defeat a biometric system is to find a way to bypass the system altogether. Although this may seem obvious, system managers often setup alternatives to the biometric to make the system easier to administer in case of problems. Types of system circumvention include the following: • Backdoor Entrance in a logical security system, hackers may be able to expose software loopholes which allow for system access without having to submit a biometric sample. In physical security, an alternate entrance devoid of a biometric reader can allow for system circumvention. For example, in Mission Impossible, a character was able to circumvent a Multiple Biometric Access (MBA) application by entering through an air duct in the roof. • Forced Exception Processing – creating circumstances that will fo