Researcher details findings on spoofing GPS, malicious insiders

Researcher details findings on spoofing GPS, malicious insiders

Researcher details findings on spoofing GPS, malicious insiders

Date: Sep 13, 2012

Biometric authentication systems, electronic voting machines and the Global Positioning System – technologies that play a major role in the day-to-day security and operations of the U.S. – can be hacked in the blink of an eye. It's Roger Johnston's job to figure out how.

"In one case," Johnston said, "we defeated a fairly sophisticated biometrics access control system with parts from a Bic pen."

In this video recorded at the 2012 (ISC)2 Security Congress in Philadelphia, Johnston, head of the... Vulnerability Assessment Team at Argonne National Laboratory, discusses how easy spoofing GPS data can be and what the worst-case scenario might be for enterprises, as well as Argonne's research on the growing threat of disgruntled, malicious insiders and simple ways to reduce the threat they pose.

More on Biometric Technology

  • canderson

    PayPal CISO hopes FIDO Alliance can help replace weak passwords

    VIDEO - Video: PayPal CISO Michael Barrett discusses the FIDO Alliance launch and how the open standard for online authentication might help replace weak passwords.
  • canderson

    Secure authentication trends: Cloud biometrics, next-generation authentication

    VIDEO - In this video, Ant Allan discusses secure authentication trends, including next-generation authentication options and cloud biometrics possibilities.
  • Report: Popularity of biometric authentication set to spike

    News - Juniper Research claims that the popularity of biometric authentication will rise dramatically in the next five years, incorporating innovative technology beyond today's fingerprint sensors and voice authentication systems.

    ( Jan 22, 2015 )

  • How is Internet authentication changing?

    Quiz - You've reviewed the webcast, tip and podcast. So: Are you ready for the way Internet authentication practices will be changing? Take this quiz and see.
  • image replay attack

    Definition - An image replay attack is the use of a picture to fool an authentication method. Image replay attacks are most commonly used by an attacker trying to gain entry to a system protected by less-than-secure biometric authentication technology implementations.
  • mobile authentication

    Definition - Mobile authentication is the verification of a user’s identity through the use a mobile device and one or more authentication methods for secure access.
  • FIDO (Fast Identity Online)

    Definition - FIDO (Fast ID Online) is an open standard for a secure and easy-to-use universal authentication interface created to address the lack of interoperability among strong authentication devices. The FIDO standard supports multifactor authentication and strong features like biometrics.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: