In modern gadgets, several methods of identifying the owner are available at once: a picture password, a PIN code, a fingerprint scanner or face unlocking. Daniil Chernov, director of the software security solutions center for Rostelecom-Solar, told which of the above methods is best for the user.
“In the theory of information security, there is a classification of means of authentication data that can be used to authorize in various systems, – explained the expert.” To unlock a smartphone, there are basically two types: something that the user knows and something that the user is. “
According to Chernov, what the user knows includes all sorts of passwords and pictures, but they are quite easy to spy on, and often logically guess. “The most secure is a long and complex password consisting of numbers and symbols,” the specialist continues. “However, entering such a password takes time every time. For modern users who actively use their smartphone during the day, this is inconvenient. If the user decides to choose protection password, it is important that he does not repeat himself with his passwords to log into any other systems. “
The second type of authentication data is biometric data. For example, authorization through fingerprint, face or voice scanning. “Of the listed identifiers, only a voice can be stolen and reproduced, while the technology that recognizes the owner of the voice is still quite crude,” the expert said. It should be noted that the level of protection in this case depends on how the scanning technology is implemented in the smartphone. Smartphones of the low budget category can hardly have a high-quality recognition system, which is difficult to deceive with a photo or a print. “
Finally, if the user has an iOS smartphone, he can use any biometric data for authentication. “Fingerprint recognition systems and FaceID are highly accurate and meet security requirements. If you are the owner of a flagship on Android, the best means of protection would be to use fingerprint sensors to scan your fingerprints. I recommend that users of low-cost smartphones use complex passwords to unlock the screen and additionally protect critical applications with passwords ( for example, banking), if they allow it to be done, “Chernov concludes.
– .