Professional Documents
Culture Documents
Bodambaev Tamerlan
Shakhayev Amir
6B06301 - Cybersecurity
Diploma work
Supervisor
Temirbek A.
Kazakhstan Republic
Nur-Sultan, 2024
CONTENTS
Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Designations and abbreviations . . . . . . . . . . . . . . . . . . . . . 4
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1 Literature Review . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.1 Enhanced Fraud Prevention: Empirical Evidence and Quantitative
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.2 Privacy Concerns: A Critical Examination and Ethical Implications 6
1.3 Analytical Methodologies: Navigating the Trade-off Between
Security and Privacy . . . . . . . . . . . . . . . . . . . . . . . . . 7
2 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1 Data Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2 Inclusion Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.3 Data Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3 Preliminary Results . . . . . . . . . . . . . . . . . . . . . . . . . 9
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2
DEFINITIONS
Following terms are used in this work:
3
DESIGNATIONS AND ABBREVIATIONS
Following designations and abbreviations are used in this work:
∀ text
AAA text text text.
ABC text text text text text text text text text text text text text text
text text.
4
INTRODUCTION
The digital age has witnessed an exponential growth in reliance on
online platforms and services, making robust cybersecurity measures paramount.
Biometric authentication systems have emerged as a promising technology,
offering a convenient and seemingly secure method for user identification and
access control. However, their integration into cybersecurity practices raises a
critical debate, balancing the potential for enhanced fraud prevention against
inherent privacy concerns. This comprehensive literature review delves into
the multifaceted role of biometrics in cybersecurity, meticulously analyzing
their effectiveness in thwarting fraudulent activities while critically evaluating
associated privacy challenges.
Aim of the work. To investigate the role of biometrics in both enhancing
fraud prevention and raising privacy concerns within cybersecurity, employing
an analytical methodology to assess potential protection strategies and their
effectiveness.
Novelty. Article’s novelty lies in its comprehensive analysis, incorporation of
quantitative data, exploration of user experience and ethical considerations, and
focus on future research directions.
• Focus on specific data and quantitative analysis: You incorporate specific
data points and quantitative findings from various studies to strengthen your
arguments regarding the effectiveness of biometrics in fraud prevention. This
quantitative analysis adds depth and credibility to your claims.
• Exploration of user experience and ethical considerations: You delve into
the user perspective by highlighting concerns about privacy and potential misuse
of biometric data. This demonstrates a well-rounded understanding of the ethical
implications associated with biometric authentication.
Goals:
1 Consider whether there have already been such articles as our diploma and
tell about them in the literature review.
2 Collect articles with biometric statistical data that are suitable for us to
enhance fraud prevention and raising privacy concerns within cybersecurity.
3 Consider this in cybersecurity by compiling an analytical methodology to
evaluate potential protection strategies and their effectiveness.
5
1 Literature Review
7
2 Methodology
8
3 Preliminary Results
The initial analysis yielded promising insights, highlighting both the potential
benefits and challenges associated with biometrics in cybersecurity. Here are some
preliminary findings:
Enhanced Fraud Prevention: Several studies reported significant reductions
in fraudulent activities after implementing biometric authentication systems. For
instance, Khan et al. (2023) observed a 78% decrease in fraudulent transactions
in the banking sector following the adoption of multi-modal biometrics.
Privacy Concerns: A significant portion of users expressed apprehension
regarding the collection and storage of their biometric data. Skalkos et al. (2021)
reported that 62% of users surveyed voiced concerns about privacy implications.
Vulnerability to Spoofing Attacks: Studies highlighted the potential for
spoofing attacks to bypass biometric authentication systems. Zatonskikh et al.
(2018) emphasized the need for advanced anti-spoofing techniques to mitigate
this risk.
9
BIBLIOGRAPHY
1.Yang, J.C Park, D.S. A fingerprint verification algorithm using tessellated
invariant moment features. Neurocomputing , 2008, 71, 1939– 1946.
2. Khalil, M. S.; Mohammed, D.; Khan, M. K. Al-Nuzaili, Q. Fingerprint
verification using statistical descriptors. Digital Signal Proces., 2009, 20(4),1264-
1273.
3. Helfroush, M.S. Mohammadpour, M. Fingerprint verification system: a
non-minutiae based approach. In International Conference on Computer, Control
and Communication , 2009, pp. 1-4
4.Icao, “9303-Machine Readable Travel Documents-Part 9: Deployment of
Biometric Identification and Electronic Storage of Data in eMRTDs,” 2015.
5.A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information
Security ” IEEE Transactions on Information Forensics And Security, vol. 1, no.
ue 2, pp. 125 – 144, 2006.
10