Researcher details findings on spoofing GPS, malicious insiders

Researcher details findings on spoofing GPS, malicious insiders

Researcher details findings on spoofing GPS, malicious insiders

Date: Sep 13, 2012

Biometric authentication systems, electronic voting machines and the Global Positioning System – technologies that play a major role in the day-to-day security and operations of the U.S. – can be hacked in the blink of an eye. It's Roger Johnston's job to figure out how.

"In one case," Johnston said, "we defeated a fairly sophisticated biometrics access control system with parts from a Bic pen."

In this video recorded at the 2012 (ISC)2 Security Congress in Philadelphia, Johnston, head of the... Vulnerability Assessment Team at Argonne National Laboratory, discusses how easy spoofing GPS data can be and what the worst-case scenario might be for enterprises, as well as Argonne's research on the growing threat of disgruntled, malicious insiders and simple ways to reduce the threat they pose.

More on Biometric Technology

  • canderson

    PayPal CISO hopes FIDO Alliance can help replace weak passwords

    VIDEO - Video: PayPal CISO Michael Barrett discusses the FIDO Alliance launch and how the open standard for online authentication might help replace weak passwords.
  • canderson

    Top secure authentication trends: Cloud biometrics, next-generation authentication

    VIDEO - In this video, Ant Allan discusses secure authentication trends, including next-generation authentication options and cloud biometrics possibilities.
  • keystroke ID (keystroke identification)

    Definition - The use of an individual's distinctive typing dynamics can be used as a non-intrusive and reliable form of biometric authentication.
  • strong authentication

    Definition - Although it is not a standardized term, with set criteria, strong authentication can be said to be any method of verifying the identity of a user or device that is intrinsically stringent enough to ensure the security of the system it protects by withstanding any attacks it is likely to encounter.
  • Report: Popularity of biometric authentication set to spike

    News - Juniper Research claims that the popularity of biometric authentication will rise dramatically in the next five years, incorporating innovative technology beyond today's fingerprint sensors and voice authentication systems.

    ( Jan 22, 2015 )

  • How is Internet authentication changing?

    Quiz - You've reviewed the webcast, tip and podcast. So: Are you ready for the way Internet authentication practices will be changing? Take this quiz and see.
  • image replay attack

    Definition - An image replay attack is the use of a picture to fool an authentication method. Image replay attacks are most commonly used by an attacker trying to gain entry to a system protected by less-than-secure biometric authentication technology implementations.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: