Life as we know it is changing. The world is getting more complex- virtually everyone and everything (people, things and services) will be connected everywhere 24/7 in one global cloud. What this means for Identity and Access Management (IAM) is that there would be an increasing dependence on IAM in our personal and business lives. A new approach to IAM is therefore inevitable as technology will continue to change our lives in future years.
90% of the worlds cyberattacks have resulted from users’ inability to protect and manage passwords. The current IAM approach which uses passwords for authentication cannot support the security of the future, where devices will be interconnected, especially when firewalls as security parameters are not sufficient anymore. The binding of forces: mobile, social, cloud and information is bringing new challenges and opportunities for IAM and organizations that fail to get to grips with the challenges and opportunities of the nexus risk falling behind.
The increase in interconnected systems will result in the prevalence of seamless, continuous and accurate access to all resources with advanced authentication systems such as biometric and artificial intelligence technology. Passwords would become obsolete; user controlled access management would be eclipsed by the more accurate machine generated ones. Using some of our personal and distinct features, smart systems will be able to recognise and greet us when we walk into a building or restaurant, use the ATM or even drive cars.
The gist is that artificial intelligence and IAM will play a major role in revolutionizing security and the Internet of Things, as more and more devices begin to be interconnected and communicate with one another, free from human intervention. Nearly everything will have an identity, which will change the face of identity theft. Continuous authentication is therefore deeply rooted in the future of IAM. People share devices and web applications with little considerations about the potential risks involved- whether a colleague gains access to confidential information, or an acquaintance accidentally views personal account details. Traditional one authentication methods will no longer be adequate. The question then begs asking, how will all these come about?
An auspicious type of continuous authentication is in the area of behavioral biometrics, which is centered around unique human behaviors. Tools can monitor and analyze things like keystroke patterns, mouse patterns, gait, walking movement and so on. Other biometric authentication options include: –
Ear geometry (no two ears are exactly alike, even on the same person)
Heart rhythm can be used in wristbands and other devices for wireless identification to the computer, cars, house, and in stores for making payments, etc.
Beyond authentication lies authorization. With the increasing number of interconnected devices, authorized parties must be given access while unauthorized partied be denied access. How this pans out will shape the face of cyber-security in the near future.