Key points are not available for this paper at this time.
Securing sensitive data and mitigating cyber threats necessitates robust user authentication mechanisms within Information Security Management Systems (ISMS). Conventional authentication approaches, such as passwords and static biometric identifiers, exhibit vulnerabilities, urging the adoption of more sophisticated solutions. Behavioral biometrics, which analyzes unique behavioral patterns like typing rhythm and mouse movements, offers a promising avenue for enhancing authentication security while optimizing user experience. This paper examines the integration of behavioral biometrics into ISMS for user verification, emphasizing its advantages including continuous, multimodal, risk-based, and adaptive authentication. Additionally, it addresses considerations like data privacy, regulatory compliance, user experience enhancement, and monitoring and analysis to ensure successful implementation and efficacy. By leveraging behavioral biometrics as part of a holistic authentication strategy, organizations can fortify their security posture, mitigate threats, and adapt to evolving cybersecurity challenges.
Building similarity graph...
Analyzing shared references across papers
Loading...
Rahul et al. (Mon,) studied this question.
www.synapsesocial.com/papers/68e72771b6db6435876a1644 — DOI: https://doi.org/10.15680/ijircce.2024.1203054
C. Rahul
A Rengarajan
International Journal of Innovative Research in Computer and Communication Engineering
Jain University
Building similarity graph...
Analyzing shared references across papers
Loading...