Premium Essay

Biometrics Moving Forward

In:

Submitted By NMBuck
Words 3757
Pages 16
BoBiometrics to Secure Networks
John W. Sisson
American Public University

Contents Abstract 3 Biometrics to Secure Networks 4 Biometrics Defined 4 Biometric Process 5 Fingerprinting 6 Face Recognition 7 Iris Recognition 8 Hand Recognition 9 Voice Recognition 9 Dynamic Signature 10 Keystroke Dynamics 10 Gait Recognition 10 Facial Thermograph 11 Emergence 11 Obstacles to Biometric Success 12 Conclusion 13 References 15

Abstract
Biometrics was once thought to be more of a science fiction means of authentication, not something that could be used in real life applications. The cost was much higher than most companies dreamed of spending. Username and passwords were an effective and efficient means of security. Computer security was not looked at as a must, but more of a way to keep honest people honest. However, as computing power increased, and corporate espionage has led to massive losses for companies, computer security needs increased. Passwords just were not the best means of securing a network anymore. At the same time, improvements in technology made the use of biometrics more efficient. We will now examine the different types of biometric and how they will make the network more secure.
Biometrics to Secure Networks
For years, passwords have been the method used to secure networks. A user would input his or her userid and password to gain access. Many times, the userid was also the first portion of the users E-mail address. This means the only real secret items keeping others out of the network was physical access and that user’s password. Because brute force attacks took a while to complete, most companies were willing to accept this risk. But, as computing power increased, so did the complexity requirements of passwords. Today, the complexity leads many users to writing down the password, lessening the security even

Similar Documents

Free Essay

Office Equiptment

...Accounting Equipment An electronic calculator is a small, portable, often inexpensive electronic device used to perform both basic and complex operations of arithmetic. Modern calculators are more portable than most computers, though most PDAs or mobile phones are comparable in size to handheld calculators and may soon replace them. The first solid state electronic calculator was created in the 1960s, building on the extensive history of tools such as the abacus, developed arou nd 2000 BC; and the mechanical calculator, developed in the 17th century. It was developed in parallel with the analog computers of the day. Pocket sized devices became available in the 1970s, especially after the invention of the microprocessor developed by Intel for the Japanese calculator company Busicom. An adding machine was a class of mechanical calculator, usually specialized for bookkeeping calculations. In the United States, the earliest adding machines were usually built to read in dollars and cents. Adding machines were ubiquitous office equipment until they were phased out in favor of calculators in the 1980s and by personal computers beginning in about 1995. The older adding machines were rarely seen in American office settings by the year 2010. A spreadsheet is an interactive computer application program for organization and analysis of information in tabular form. Spreadsheets developed as computerized simulations of paper accounting worksheets. The program operates on...

Words: 3224 - Pages: 13

Free Essay

Future Where Money Is Only Electronic

...“Future where money is only electronic” Son Chunsuparerk Part A : Technological Infrastructure The following key enablers make the future possible Computing form factor: As all financial activities, including day-to-day merchandise will become electronic, the computer form factor will evolve in the way that allows people to carry it anywhere and everywhere. Computers will be smaller, faster, and embedded into human body to facilitate real time communication for financial activities. From history, computer forms have evolved from time to time. From a poor performance computer that filled the entire room to a bulky computer that sat on the entire table, to now being small compact laptop, tablet, and mobile that fit in a tiny pocket. In today’s environment, credit card is a great example how money went partially electronically. The drawback of using a credit card is that of the credit card receiver (eg. credit card is unusable if there is no device to accept). The future will need computers to miniaturize into a small fingertip size, which enables money to seamlessly transfer from one party to another. Credit card receivers will be small enough to fit into a wallet, just like a credit card, and have the functionalities to control over all financial needs just like using cash/check today. Power: In order to keep mobility and minimal form factor, one needs to consider its on power. In the future, power consumption on certain devices will be low, while power...

Words: 2124 - Pages: 9

Premium Essay

Smart Cards in Healthcare

...that contains an embedded computer chip that stores and transacts data (Smart card basics, n.d.). The computer chip could function strictly as memory or as a microprocessor depending on the intended use of the smart card. “The data is usually associated with either value, information or both and is stored and processed within the card’s chip” (Smart card basics, n.d.). Smart cards are being used in several different markets currently in the United States. European countries have been utilizing smart card technology for almost three decades. (Smart card basics, n.d.). The Smart Card Alliance is a group of businesses that have a vested interest in the adoption of smart card technology. The Smart Card Alliance’s mission is to help the forward momentum of the use of smart card technology in health care in the United States (Smart card alliance, 2007). Europe initially used the smart card as a tool for reducing theft at pay phones. Their use has advanced tremendously over the last three decades. They are used for credit purchases and for record keeping instead of paper (Smart card basics, n.d.). In the United States, smart cards are being used by consumers in many ways. Several states have begun using them for applications within the Department of Motor Vehicles to Electronic Benefit Transfers (Smart card basics, n.d.). Their use continues to grow in the areas of cellular phone use and SIM cards, loyalty of returning consumers to particular place of business, in the gambling...

Words: 1022 - Pages: 5

Free Essay

Gait Recognition

...This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/copyright Author's personal copy Pattern Recognition 45 (2012) 3414–3426 Contents lists available at SciVerse ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr Silhouette-based gait recognition using Procrustes shape analysis and elliptic Fourier descriptors Sruti Das Choudhury, Tardi Tjahjadi n School of Engineering, University of Warwick, Gibbet Hill Road, Coventry CV4 7AL, United Kingdom a r t i c l e i n f o Article history: Received 6 September 2011 Received in revised form 15 December 2011 Accepted 21 February 2012 Available online 5 March 2012 Keywords: Gait recognition Human identification Procrustes shape analysis Elliptic Fourier descriptor Silhouette Nearest neighbour classifier Classifier combination Hu moments a b s t r a c t ...

Words: 13230 - Pages: 53

Premium Essay

Attendance Monitoring Syste,

...“Attendance Monitoring in EARIST” INTRODUCTION The emergence of electronic paradigm for learning compared to traditional method and availability of almost all information on the information superhighway(Internet), nowadays have caused students to be less motivated to come to the lecture rooms than ever before. Laziness on the part of students, nonchalance to school work, extra social activities that have no importance in aiding the objectives of the institution and a lot more, may prevent students from attending lectures. Sequel to these, lecturers and administrators in most developing countries have had to come up with ways to ensure a healthy participation from students, and make sure that the student-lecturer interactive relationship is kept intact. This in some cases have come in simple forms like roll calls, while in more interesting cases, can be formats like surprise quizzes, extra credit in class, etc. These strategies are however time consuming, stressful and laborious because the valuable lecture time that could otherwise been used for lectures is dedicated to student attendance taking [8] and sometimes not accurate. In addition to all these challenges, the attendances are recorded manually by the tutor and therefore are prone to personal errors. There arises a need for a more efficient and effective method of solving this problem. A technology that can solve this problem and even do more is the RFID technology. RFID is an automated identification and data...

Words: 1281 - Pages: 6

Premium Essay

Cool

...ACCESS CONTROL IN SUPPORT OF INFORMATION SYSTEMS SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 2, Release 2 26 DECEMBER 2008 Developed by DISA for the DoD UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD This page is intentionally blank. ii UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD TABLE OF CONTENTS Page SUMMARY OF CHANGES...................................................................................................... IX 1. INTRODUCTION................................................................................................................. 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 2. Background ..................................................................................................................... 1 Authority ......................................................................................................................... 2 Scope............................................................................................................................... 3 Writing Conventions....................................................................................................... 3 Vulnerability Severity Code Definitions ........................................................................ 4 STIG Distribution .......

Words: 38488 - Pages: 154

Free Essay

Alarm and Sattelite

...Access Control refers to the idea of preventing unauthorized persons entrance to a property, building or room. Access control systems have become a staple in secure environments. They allow the extra security without having the potential unreliability of a person sitting on guard. By eliminating the weak link “Human Error" these systems are able to make it nearly impossible to penetrate. Physical access control systems can range from a bouncer or guard stationed at the door, or through mechanical measures such as locks or keys. With the advancements in technology there is now a need for a higher means of access control and that is where key cards and electrical access control systems come into play. Physical access control systems depend on a matter of who, where, and when system. A true access control system is used to determine “who” is allowed to enter or exit, “where” said person is allowed to enter or exit, as well as controlling “when” they will be able to enter or exit. Before technological advancements this was accomplished in part with Keys and locks, when a door was locked only those with the appropriate key were able to use the door. The problem with mechanical Key and Lock systems is that they do not restrict the key holder from entering or leaving at specific times or dates. Historically, this was partially accomplished through the usage of keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured...

Words: 11067 - Pages: 45

Premium Essay

Agricultural Lending

...INTRODUCTION In many developing countries, risk management techniques are underdeveloped or insufficient for institutions to efficiently lend to activities in the agricultural sector. Information on borrowers’ credit histories is rarely available, resulting in information asymmetries that make accurate credit risk assessment difficult. In addition, while agricultural client’s major assets are production and land, it is often difficult for banks to use these as collateral, and particularly difficult to foreclose on land in case of default. Compounding this lack of traditional collateral is the presence of a high degree of covariate risk, in particular market price risk and weather risk. Banks lending to agricultural clients know that agricultural and rural revenues easily drop below break-even levels due to extreme weather events and price falls, which result in defaults and higher loan loss provisions, thereby making lending to agribusiness unprofitable. The second major constraint in agricultural lending, high transaction and supervisory costs, is due to the particular risk, nature, and characteristics of the rural sector. In all financial markets, there is a trade-of between minimizing loan default and supervisory costs, but the nature of agricultural lending, especially through microfinance institutions, makes transaction costs and supervision costs disproportionately high relative to its urban counterpart. The small size of seasonal agricultural credit results in high...

Words: 6593 - Pages: 27

Premium Essay

Computer Science Siwes Report on Time and Attendance Management (Jantek)

...KOGI STATE POLYTECHNIC SCHOOL OF APPLIED SCIENCES, MATHS/STAT/COMPUTER SCIENCE DEPARTMENT PMB 1101, LOKOJA, KOGI STATE A TECHNICAL REPORT ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) AT THE TIME OFFICE, DANGOTE CEMENT PLC OBAJANA BY AIYEDE JOHN E. 2010/ND/CPS/370 IN PARTIAL Fulfillment of THE REQUIREMENT FOR THE AWARD OF NATIONAL DIPLOMA (ND) IN COMPUTER SCIENCE. FEBRUARY 2012. CHAPTER ONE INTRODUCTION 1.1 SIWES The Student Industrial Work-Experience Scheme (SIWES) is a planned and supervised training intervention based on stated and specific learning and career objectives, and geared towards developing the occupational competencies of the participants. It is a skill Training programme designed to expose and prepare students of Agriculture, Engineering, Technology, Environmental, Science, Medical Sciences and pure and applied science for the Industrial work situation which they likely to meet after graduation. Duration of SIWES is four (4) months in Polytechnics at the end of ND I, four (4) months in College of Education at the end of NCE II and six (6) months in the Universities at the end of 300 or 400 or 500 levels depending on the discipline. Therefore, SIWES is generic, cutting across over 60 programmes in the universities, over 40 programmes in the polytechnics and about 10 programmes in the colleges of education. Thus, SIWES is not specific to any one course of study or discipline. In Nigeria, industrial training...

Words: 4649 - Pages: 19

Premium Essay

Rfid

...International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 ISSN 2229-5518 1 RFID-Based Students Attendance Management System Arulogun O. T., Olatunbosun, A., Fakolujo O. A., and Olaniyi, O. M. Abstract In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. In this paper, an attempt is made to solve recurrent lecture attendance monitoring problem in developing countries using RFID technology. The application of RFID to student attendance monitoring as developed and deployed in this study is capable of eliminating time wasted during manual collection of attendance and an opportunity for the educational administrators to capture face-to-face classroom statistics for allocation of appropriate attendance scores and for further managerial decisions. Keywords: RFID, Lecture, Attendance, Passive tag, Reader INTRODUCTION T he emergence of electronic paradigm for learning compared to traditional method and availability of almost all information on the information superhighway(Internet), nowadays have caused students to be less motivated to come to the lecture rooms than ever before. Laziness on the...

Words: 3596 - Pages: 15

Free Essay

Full Body Scanners

...The Transportation Security Administration (TSA) today announced the start of TSA Pre✓™ operations at LaGuardia Airport (LGA). TSA Pre✓™ is a passenger pre-screening initiative that allows qualified passengers to go through an expedited security process, which among other benefits, allows them to keep their shoes and light-weight jackets on while going through the checkpoint. At LGA, select Delta Air Lines frequent flyers are now eligible to participate and may receive expedited screening benefits when traveling domestically. TSA Pre✓™ is part of the agency’s larger effort to implement risk-based security concepts that enhance security by focusing efforts on travelers about whom the agency knows less. To date, more than 640,000 passengers have experienced TSA Pre✓™. TSA Pre✓™ is now available in 12 airports for both American Airlines’ and Delta Air Lines’ frequent flyers. “It is important to understand that TSA Pre✓™, and risk-based security in general, does not mean less security – it means more focused security,” said TSA Deputy Administrator Gale Rossides. “Every passenger will still be screened, and TSA officers will still be looking for prohibited items, including in the TSA Pre✓™ lane. With risk-based security initiatives, we’re adjusting the screening procedures for those passengers that we know more about so that we can focus on finding that small fraction who may pose a threat. By doing so, we hope that everyone will have a better security experience.” Eligible passengers...

Words: 1933 - Pages: 8

Premium Essay

Establishing Security Risks and Countermeasures for Large Scale Businesses

...Establishing Security Risks and Countermeasures for Large Scale Businesses Stephen Yopp 23 May 2014 ISSC-361 American Military University Establishing risks and countermeasures can be a complex procedure, even more so when protecting hundreds of systems from internal and external threats. Many tools exist to assist in implementing and scaling security operations. There are many assets that represent risks to businesses ranging from information systems to the data which is stored on them and therefore almost as many existing threats (Smith, 2013). The National Institute of Standards and Technology (NIST) describes 11 types of assets; people, organizations, systems, software, databases, networks, services, data, computing devices, circuits, and websites (Halberdier, Waltermire, and Wunder, 2011). This list is more extensive than the categories discussed, for the sake of brevity, but it might be helpful to enterprise employees seeking to identify different assets. Hardware represents a large investment for businesses. Servers, network devices, cables, workstations, and mobile devices can cost enterprise businesses millions of dollars up front. Because information systems are such an integral part of modern business, companies cannot afford to be without access to file and print servers or internet access. This means that the loss of hardware would represent setbacks in productivity, potential negative impacts to the organization’s reputation, and necessary additional...

Words: 3285 - Pages: 14

Premium Essay

Rfid Critics

...lot of research is being done to suggest methods which will ensure secure communications in RFID systems. The objective of this paper is to present RFID technology, its current, future applications, study various potential threats to security, and Critics of RFID. 1 Introduction RFID 1.0 BACKGROUND STUDY Radio Frequency Identification (RFID) is an automatic identification system. It make use of Radio Frequency (RF) to identify “tagged” items .Data collected were transmitted to a host system using a Radio Frequency Reader. RFID is one of the numerous technologies grouped under the term Automatic Identification (Auto ID), such as bar code, magnetic inks, optical character recognition (OCR), voice recognition, touch memory, smart cards, biometrics etc. Auto ID technologies are the new ways of getting data and controlling information flow of a material, especially suitable for large production networks. RFID is a means of gathering data about a certain item without the need of touching or seeing the data carrier, through the use of inductive coupling or electromagnetic waves. The data carrier is a microchip attached to an antenna (together called...

Words: 5867 - Pages: 24

Premium Essay

The Ppower of Internet and Its Impact in India

...BUSINESS GOVERNMENT AND SOCIETY THE POWER OF INTERNET AND ITS IMPACT IN INDIA INDIVIDUAL ASSIGNMENT PGDM[2013–15] BY: R O H I T K U M A R G O E L [DM15142] SECTION 1 Page |2 CONTENTS S.NO. I II III IV V TITLE INTRODUCTION IMPACT ON BUSINESS PRACTISES AND SOCIETY IMPACT ON GOVERNMENT AND SOCIETY CONCLUSION REFERENCES PAGE NO. 3 3 6 6 8 GREAT LAKES INSTITUTE OF MANAGEMENT | Introduction The internet is a medium that is soaring in polarity in almost every facet of the world and is used for a myriad of reasons by persons, universities, governments and businesses. It is the network that facilitates communication among all the smaller networks and individual computer systems that connect to it. It is growing at an impressive rate due to the many services it facilitates, the ease with which services can be created, the presence of a single standard and the global reach that makes national boundaries invisible. With the dramatic increase in bandwidth, decreasing communication costs and an everincreasing number of organizations using it, the Internet has ushered in a revolution. As far as businesses are involved, the internet usage has been tested to a variety of experimentations that seek to determine the viability of using the internet to improve business practices in various industries in India. One particular aspect of business is that the internet marketing has a great impact on society. Around the world, developed countries have improved their communication systems...

Words: 3214 - Pages: 13

Free Essay

Strategic Marketing

...------------------------------------------------- ------------------------------------------------- ------------------------------------------------- NUST Business School MKT-323 Services Marketing Analysis of the Pakistani 3G/4G Industry Submitted to; Mrs. Rabeil Khan Submitted by; Saad Tanvir Ahmed, Nawaal Rizwan, Fatima Tanveer, Ayesha Manzoor and Faizan Tariq BBA 2K12 (B) Contents Executive Summary 3 Introduction 3 About 3G/4G 3 The Pakistani Market 3 Warid 5 Zong: 7 3G and 4G: 7 Pricing Strategy: 7 Packages: 8 4G packages: 9 Branding Strategy: 9 Telenor 12 Pricing strategy: 12 Prepaid: 12 Activation: 12 3G Packages 13 Terms and Conditions 13 Video Call 14 Postpaid: 14 Professional Smart Plans 14 Terms and conditions: 15 Postpaid Internet bundle 15 Terms and Conditions 15 Video call: 16 3G enabled USB Dongle: 16 Packages: 16 Terms and Conditions 17 Branding Strategy: 17 Mobilink: 19 Pricing Strategy: 19 PREPAID: 20 Activation of Mobilink 3G: 20 Mobilink 3G Packages: 20 Video Calling: 21 POSTPAID: 22 3G enabled USB Dongle: 22 Branding Strategy: 23 Ufone: 28 Pricing Strategy: 28 Packages 29 Analysis: 31 Branding Strategy: 31 For the average student 34 Conclusion 37 References 37 Executive Summary Four of the telecom operators (Ufone, Zong, Telenor and Mobilink) got the license of 3G internet in the auction of April, 2014. All the operators plan to give efficient...

Words: 6719 - Pages: 27