Premium Essay

Biometric Security in the Workplace

In:

Submitted By esparzacm
Words 3807
Pages 16
Abstract
Biometrics has garnered considerable interest from both the Government and private industry. This interest has lead to a number of biometric technologies each with their own share of strengths and weaknesses. The process used in the verification and identification of people using fingerprint, retina-based, iris-based, hand geometry, and facial recognition biometrics are examined in this paper. The advantages and disadvantages of each of these methods are also explored. The future of biometrics is also considered given the current developments in the field.

Organizations are constantly looking for a more secure authentication method for their users to gain access to e-commerce and other security applications. Biometrics continues to gain more and more attention. What is biometrics the right decision for your corporation? If you choose to use biometrics, which is the biometric solution for your corporation, there is no such thing as any one best type of biometrics. Different applications necessitate the use of different biometrics.
In order to select the right biometric for your solution as a user you will need to investigate a myriad of vendor products while keeping an eye on future development and technology. Never before have there been more various and more varied options. Vendors have a wide variety of products to select from. Some are new to the market but even these can be considerably better and greatly improve your company security stance.
The focus of biometrics is to measure and individuals physical and behavioral characteristics and to recognize and authenticate their identity. Commonly used physical biometric solutions include: fingerprints and geometry and retina, Iris and facial characteristics. Behavioral biometrics solutions include: signature, voice, gait and keystroke patterns. In this group the technologies of signature

Similar Documents

Free Essay

Biometric

...Title (2) Biometric scanning system types and which one is more effectiveness in a workplace Biometric recognition, or biometrics, refers to the automatic authentication of a person based on his or her physiological or behavioural characteristics (Jain, Bolle, and Pankanti 1999a; Maltoni, Maio, Jain, and Prabhakar 2003). One of the most important technologies which acts as a human being identify required purpose. Nowadays there were great progresses in technology of access for companies which it using human being body to identify the identity of the person. In the past Human beings used fingerprint to identity for signature. Biometric technology looks like a revolution for modern society for example, Iris and AFIS (Automatic Finger Print Identification System). Although fingerprint has a good feature to identify people but I will argue that iris system has shown the best performance to do the required purpose of scanning and identification more accurately than fingerprint. Reliability Fingerprint is a biometric device by which the people been identified through scanning fingerprint of the person and save the data to store the fingerprint image. Furthermore fingerprint identification scanning is reliability because fingerprint identification and authentication is the mature biometric technology (Komarinski, 2005). Firstly, the fingerprint is reliable because it includes quite huge information and will keep for all life of human being, In spite of the fingerprint just...

Words: 1161 - Pages: 5

Premium Essay

Biometrics

...“Biometric attendance in the workplace is a threat to privacy”. How far do you agree? (30 marks) Ref - http://www.biometrics.org/html/introduction.html Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. Biometric-based authentication applications include workstation, network, and domain access, single sign-on, application logon, data protection, remote access to resources, transaction security and Web security. Trust in these electronic transactions is essential to the healthy growth of the global economy...

Words: 665 - Pages: 3

Free Essay

Enterprise Security Services

...strong security service to protect already gathered information. Production, distribution and some other functions were very difficult to achieve due to weak security services but as the days passed by enterprise has struggled to secure its services and with the aid of growth in technology and programming enterprise services has reached a reasonable degree in achieving its dream by protecting its services from harm. An enterprise is an activity or a project that produces services or products. There are essentially two types of enterprise, business and social enterprises. Business enterprises are run to make profit for a private individual or group of individuals. This includes small business while social enterprise functions to provide services to individuals and groups in the community. These shows that an enterprise security service is a form of protecting the services or the product of individuals and groups in the community from harm (preventing unauthorized users from gaining access). Enterprise now uses Biometric, Encryption and some others forms of security to form the backbone of its services. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of identification is preferred over traditional methods involving passwords and PIN numbers for its accuracy and case sensitiveness. A biometric system is...

Words: 4428 - Pages: 18

Premium Essay

Cool

...ACCESS CONTROL IN SUPPORT OF INFORMATION SYSTEMS SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 2, Release 2 26 DECEMBER 2008 Developed by DISA for the DoD UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD This page is intentionally blank. ii UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD TABLE OF CONTENTS Page SUMMARY OF CHANGES...................................................................................................... IX 1. INTRODUCTION................................................................................................................. 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 2. Background ..................................................................................................................... 1 Authority ......................................................................................................................... 2 Scope............................................................................................................................... 3 Writing Conventions....................................................................................................... 3 Vulnerability Severity Code Definitions ........................................................................ 4 STIG Distribution .......

Words: 38488 - Pages: 154

Premium Essay

History and Uses of Biometrics

...History and uses of Biometrics HISTORY AND USES OF BIOMETRICS By Marie C. Smith Gerard Beatty SEC310 March 10, 2014 Table of Contents I. First uses of Biometrics Facial recognition------------------------------------------------------------------------------3 Ancient finger prints---------------------------------------------------------------------------4 II. Types of Biometrics A. Physiological-------------------------------------------------------------------------------4 DNA fingerprinting-----------------------------------------------------------------------5 IRIS Recognition--------- ----------------------------------------------------------------5 B. Behavioral-----------------------------------------------------------------------------------6 HISTORY AND USES OF BIOMETRICS Biometrics which is a Greek term for bio-life and metrics-measure has been used since caveman time on cave paintings by putting a handprint next to the painting to distinguish the artist so everyone knows who painted it and later in in china parents hand printed and foot printed their children to identify while and Egyptian merchants and traders were identified by physiological descriptions to tell who were the trusted traders of successful transactions and those new to the marketplace. Today biometrics is the use of both physiological and behavioral sciences to identify and secure work sites that are critical to the ways we bank and do business...

Words: 1291 - Pages: 6

Premium Essay

Information Security Policy

... Information Security Policy Student Name: Brice Washington Axia College IT/244 Intro to IT Security Instructor’s Name: Professor Smith Date: 11/7/2011 Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3 Executive Summary Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. With advancements in technology there is a need to constantly protect one’s investments and assets. This is true for any aspect of life. Bloom Design is growing and with that growth we must always be sure to stay on top of protecting ourselves with proper security. For Bloom Design the...

Words: 4226 - Pages: 17

Free Essay

The Security Authentication Process

...The Security Authentication Process Simply put, authentication is the process by which a subject’s (or user’s) identity is verified (Conklin, White, Williams, Davis, & Cothren, 2012). An example of authentication most people are familiar with is their e-mail login. For instance, Gmail requires a person’s Gmail address and individual password to access his or her Gmail account. However, there are numerous types of authentication outside the common username and password. Furthermore, authentication is used in numerous areas of a system to re-verify a user’s identity when he or she is accessing a new area of the system, accessing encrypted data types, and securing the preservation of a system. This paper evaluates the different authentication types, their applications, and additional security measures for securing a system and its data. Types of Authentication According to Whitman and Mattford (2010), there are four types of authentication mechanisms, which are: * Something a person knows (passwords or passphrases) * Something a person has (such as cryptographic tokens or smartcards) * Something a person is (a fingerprint, retina or iris scan, or hand topography or geometry * Something a person produces (such as voice or pattern recognition) The level of access control associated with a system and the data contained on the system is determined by legislation (varies geographically) governing data, and control policies developed and implemented by the...

Words: 1415 - Pages: 6

Premium Essay

Disaster Recovery Plan

...| Enhanced Security for Data Access | | Richard Edvalson 1/12/2014 | Contents I. Contents 1 II. Introduction 5 III. Access Control Layers 5 A. The Access Control Perimeter 5 B. Asset Containers 5 C. Workplace Perimeter 5 IV. Access Control Methods and Technical Strategies 5 A. Identification, Authentication, and Authorization 5 B. Logical Access Controls 5 1. Network Architecture Controls 5 2. Remote Network Access 5 3. Security Network Ports 5 4. Encryption 5 5. PKI Compliance Requirements 5 6. Passwords, Pins, and Other Forms of Access 5 C. Physical Access Controls 5 1. Classified Storage and Handling 5 2. Badges, Memory Cards, and Smartcards 5 3. Physical Tokens and Physical Intrusion Detection 5 V. Access Control Integration and Administrative Strategies 5 A. Biometric Systems 5 B. Separation of Duties 5 C. Protecting the Enrollment Process 6 D. Protecting the Verification Process 6 E. Cryptographic Controls 6 F. Integrating Access Control Methods 6 VI. Public Key Infrastructure 6 A. DoD-Approved PKI 6 B. Multi-factor Authentication 6 C. Identification and Authentication through Digit Signature of Challenge 6 D. Data Integrity through Digital Signature of the Information 6 E. Confidentiality through Encryption 6 F. Assists with Technical non-Repudiation through Digital Signatures 6 VII. Mitigating Risk in the User Domain 6 A. Interviewing and Background Screening...

Words: 590 - Pages: 3

Premium Essay

Biometric Identification Technology

...| Biometric Identification Technology | | By Group C: | HUMN432 | 6/10/2012 | | Table of Contents Introduction History of Biometric Identification Biometric Identification Advancement Timeline * Types of Biometric Identification Technologies and How They Work Benefits of Biometric Identification Technology How and Where Biometry is Used In the USA Controversial Issues and Legalities of Biometric Identification Conclusion Bibliography Introduction Biometric Identification Technology is the world-wide used computer science that identifies humans based on physiological and behavioral traits for access control and security. The computer processing idea has been around for hundreds of years but the equipment has only been available for the past several decades evolving to become better with each step. The need for a formal system to record and identify first-time and repeated offenders in the 1800s led the known Bertillon to develop anthropometrics to identify individuals. This advancement was later linked with computer systems to create a true biometric system identifier. The several types of biometric identifiers, later discussed, have evolved from a mere idea to an implemented security system used in airports, government programs, and even small businesses. The technology is used globally from the US to the UK, India, Germany, and many more. Its long history has created responsiveness and allowed countries to embrace the welfares of such a...

Words: 7486 - Pages: 30

Premium Essay

It/244 Final

...Information Security Policy Gennie Diamond Axia College of University of Phoenix IT/244 – Intro to IT Security October 10, 2010 Executive Summary The goals of this information security policy will be to state the principles and guidelines for protecting the confidentiality, integrity, and availability of sensitive information and resources for XYZ Energy. This policy will set forth requirements for securing the network’s confidential information and data communications infrastructure, in addition to defining detailed policies in the areas of physical security, access control, and network security. Assumptions of the security plan defines physical security at each site for the environment around the network including entry control at each facility, the need and responsibilities of security staff, and issues around security in common areas. Information system security defines workplace protection and guidelines for storage, protection, and maintenance of hardware and network equipment. Access control policies address user enrollment and all network access privileges, along with identification and authentication process policies. Finally, network policies are defined for granting and managing network access while still protecting sensitive company data. Project constraints can include, but are not limited to, availability of resources needed to provide appropriate security for each defined security goal; time restraints for meeting these goals;...

Words: 1790 - Pages: 8

Premium Essay

Business Process

...information security strategy. Given the dominance of IT, technical computer security is also a very important component of information security. One reason for continuing security failures is that it is often difficult to connect security measures to business priorities and thereby gain sufficient management and employee attention. Good practice suggests that management should assess the risks surrounding information and balance the costs of security measures against the possible impact of security failures. However, the difficulty of quantifying these matters limits the effectiveness of structured decision-making processes in practice. Finally, as security failures increasingly impact on individual consumers and citizens, there is a developing regulatory agenda, particularly around the security of personal information. As a result, a business may need to shift its thinking from internal risk management to meeting external demands. (1) Network intrusions are widely viewed as one of the most serious potential national security, public safety and economic challenges. Technology, in this case, becomes a double-edge sword. “The very technologies that empower us to lead and create also empower individual criminal hackers, organized criminal groups, terrorist networks and other advanced nations to disrupt the critical infrastructure that is vital to our economy, commerce, public safety, and military,” the White House says. It appears that risk to national and global security recently...

Words: 797 - Pages: 4

Premium Essay

Erecruiting

...e-Recruiting Jerry Matthews Devry University Fall Quarter 2013 Dr. Julian Hernandez Suggest how HR professionals can use online recruiting to more effectively support recruitment activities while reducing organizational costs. In this age of doing everything online, recruiting is no different. HR has had to adapt just as any other industry. One of the great things about online recruiting is that many of the services are free. HR professionals can utilize what is already at their fingertips like sites such as LinkedIn, Indeed, and Simply Hired. Some career websites however, require that the job posters adhere to strict criteria in order to post on the site. The career website Careerealism.com has the motto “every job is temporary” and that we all should have access to good career coaching (Influential, 2014). Anyone that wants to create a listing must meet the site’s demands for contributing tools, information, and resources to ensure readers get cutting-edge advice to help them with all aspects of career development (Influential, 2014). The website is very well known for providing regularly career tips, newsletters, live webinars and video tutorials all available around-the-clock (Influential, 2014). HR uses recruiting sites to evaluate skills, attract candidates and communicate benefits among other things (Gueutal & Stone, 2005). Utilizing these sites to recruit high-quality applicants is most definitely possible and also suggested if costs are a major...

Words: 1878 - Pages: 8

Free Essay

Gartners Hype Cycle

...Research Publication Date: 5 August 2005 ID Number: G00130115 Gartner's Hype Cycle Special Report for 2005 Jackie Fenn, Alexander Linden This year, we celebrate the 10th anniversary of Gartner's Hype Cycles. More than 1,600 information technologies and trends across 68 markets, regions and industries are evaluated in the most comprehensive assessment of technology maturity in the IT industry. © 2005 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice. ANALYSIS Gartner's Hype Cycles highlight the relative maturity of technologies across a wide range of IT domains, targeting different IT roles and responsibilities. Each Hype Cycle provides a snapshot of the position of technologies relative to a market, region or industry, identifying which technologies are hyped, which are suffering...

Words: 1983 - Pages: 8

Premium Essay

It World

...learning more? Check out the list of upcoming events offering "Security Essentials Bootcamp Style (Security 401)" at http://www.giac.org/registration/gsec Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SA NS In sti tu te © SANS Institute 2004, As part of GIAC practical repository. 20 04 Valdo Araiza 3/30/2004 ,A GIAC Security Essentials Certification (GSEC) Practical Assignment Version 1.4b ut ho rr Technological Advances and the Effect on Physical Security eta ins fu ll r igh ts. Author retains full rights. Abstract The strides in technology each year have surpassed the previous year by leaps and bounds and will probably continue to do so in the future. Information technology continues to advance in ways that greatly benefit society on many levels but as the increasing benefits develop so do the security vulnerabilities associated with information technology. Hardware and software is being released to the general public that can help people be more productive but this same technology can be used to infiltrate or impede practiced physical security measures whether that effort is intentional or not. In this paper we will explore both sides of this technology. We will look at the side of technology that is designed to benefit physical security defenses and solutions along with the side that can be used as a physical security threat. Now let us explore the advances in mobile computing...

Words: 5538 - Pages: 23

Premium Essay

Audit Controls

...[pic] Auditing and Assurance services (C05118) SUBMITTED TO: Lecturer Mrs. Robyn Parry Due Date: January 25, 2011 SUBMITTED BY: Student Name Student ID Anil 12348982 TABLE OF CONTENTS 1. Control related terms………..……………………………………………….. 3 2. Tone at the Top............................……………………………………………...8 3. Conditions of the fraud......…………………………………………………….10 4. Control reliance testing………………………………………………………..11 5. Control deficiency..............................…………………………………………12 6. Promoting personnel across functional departments………………......………14 7. Audit Materiality...……………………………………………………………..15 8. References……………………………………………………………………..16 1) CONTROL RELATED TERMS • CONTROL ENVIRONMENT It is the main component of the internal control that management designs and implements to provide reasonable assurance that their objectives would be met. The control environment consists of the actions, policies and procedures that reflect the overall attitudes of top management, directors and owners of an entity towards internal control and its importance to the entity. It provides discipline and structure, and encompassing both the ethical values and technical competence. Management has to be serious and provide indications to the employees that they are very...

Words: 3234 - Pages: 13