Behavioural Biometrics as a User Authentication Mechanism in ISMS
Keywords:
Biometric authentication, static biometric identifiers, authentication security, behavioral biometrics, behavioral biometrics.
Abstract
Securing sensitive data and mitigating cyber threats necessitates robust user authentication mechanisms within Information Security Management Systems (ISMS). Conventional authentication approaches, such as passwords and static biometric identifiers, exhibit vulnerabilities, urging the adoption of more sophisticated solutions. Behavioral biometrics, which analyzes unique behavioral patterns like typing rhythm and mouse movements, offers a promising avenue for enhancing authentication security while optimizing user experience. This paper examines the integration of behavioral biometrics into ISMS for user verification, emphasizing its advantages including continuous, multimodal, risk-based, and adaptive authentication. Additionally, it addresses considerations like data privacy, regulatory compliance, user experience enhancement, and monitoring and analysis to ensure successful implementation and efficacy. By leveraging behavioral biometrics as part of a holistic authentication strategy, organizations can fortify their security posture, mitigate threats, and adapt to evolving cybersecurity challenges.
Published
2024-03-25
Section
Research Article
Copyright (c) 2024 International Journal of Innovative Research in Computer and Communication Engineering
![Creative Commons License](http://i.creativecommons.org/l/by-nc-nd/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.