Premium Essay

Evaluating Biometrics in the Workplace

In: Computers and Technology

Submitted By djmginger
Words 784
Pages 4
David Madurski
Introduction & Recommendation There has recently been an introduction of several new forms of security safeguards available to consumers, in the form of biometric systems. Fingerprint scanners, palm scanners, and voice recognition software are all examples of biometric safeguards available. These devices are thought by users to be quick & convenient; however these same devices also raise security concerns themselves. I see two routes our company can go; we can either install biometric technology for our company to use, or we can simply skip these upgrades and continue using our current security measures.
Description
This new technology offers us a new way to integrate personal safeguards into our company. Biometric systems could be put in place to allow access to the building through some sort of security check, like facial recognition software. Employees could also access to their equipment, such as laptops, without having to remember specific passwords. We could even tailor access to certain information or data to the specific user through use of a thumbprint scanner, giving only higher level employees access, if necessary. There are many uses for this technology, but if we’re going to implement it, we must first look at the different criteria involved in making such a decision.
Critical Evaluation When we choose security measures for our company, we need to look at several key points. We need to make sure that whatever system we decide you use, it’s reliable. It must perform consistently, because something as important as company security measures shouldn’t be failing due to technical issues. Next, we need to ask ourselves if the system is actually relatively secure or not. It would be a complete waste of time and resources if we implement a system, only to find out that it’s easily bypassed or side-stepped. We should also be

Similar Documents

Premium Essay

Slade Painting Dept. Case Study

...Slade Plating Department In the case of the Slade Plating department there are a number of problems that occur within the company. The main problem is that most of the employees within the department punch fellow co-workers timecards out when the employees are not there. A lot of these problems can be linked to the business’ organizational behavior. There are many employees within the firm that have organized into teams. The most organized being the Sarto and Clark groups. Employees in these groups and some within smaller groups have developed a system where one person in the group stays after the manager leaves at 5:00pm. The alternating individual staying late punches out the other employee’s timecards at 7:00pm allowing most of the staff to go home early without losing pay. This problem occurs because the manager arrives later and leaves earlier than any other employee. The workers are unsupervised for many hours per day and are often not supervised at all on weekends. Proper supervision and coordination of authority is paramount to improving the existing problem at the Slade Plating Department. These practices also occur because the hourly wage offered is low and the system being used is fairly easy to manipulate. There is no reason that in this modern age of technology employees are so easily able to steal from the Slade Company. Many options exist to this agency that are both inexpensive and cost effective. Modernization or implementation of new video monitoring...

Words: 2797 - Pages: 12

Premium Essay

Audit Controls

...[pic] Auditing and Assurance services (C05118) SUBMITTED TO: Lecturer Mrs. Robyn Parry Due Date: January 25, 2011 SUBMITTED BY: Student Name Student ID Anil 12348982 TABLE OF CONTENTS 1. Control related terms………..……………………………………………….. 3 2. Tone at the Top............................……………………………………………...8 3. Conditions of the fraud......…………………………………………………….10 4. Control reliance testing………………………………………………………..11 5. Control deficiency..............................…………………………………………12 6. Promoting personnel across functional departments………………......………14 7. Audit Materiality...……………………………………………………………..15 8. References……………………………………………………………………..16 1) CONTROL RELATED TERMS • CONTROL ENVIRONMENT It is the main component of the internal control that management designs and implements to provide reasonable assurance that their objectives would be met. The control environment consists of the actions, policies and procedures that reflect the overall attitudes of top management, directors and owners of an entity towards internal control and its importance to the entity. It provides discipline and structure, and encompassing both the ethical values and technical competence. Management has to be serious and provide indications to the employees that they are very...

Words: 3234 - Pages: 13

Premium Essay

Cool

...ACCESS CONTROL IN SUPPORT OF INFORMATION SYSTEMS SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 2, Release 2 26 DECEMBER 2008 Developed by DISA for the DoD UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD This page is intentionally blank. ii UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD TABLE OF CONTENTS Page SUMMARY OF CHANGES...................................................................................................... IX 1. INTRODUCTION................................................................................................................. 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 2. Background ..................................................................................................................... 1 Authority ......................................................................................................................... 2 Scope............................................................................................................................... 3 Writing Conventions....................................................................................................... 3 Vulnerability Severity Code Definitions ........................................................................ 4 STIG Distribution .......

Words: 38488 - Pages: 154

Premium Essay

Nurse

...The challenges and strategies for improving the national health as a whole will be to , increase the quality of individual life by making awareness and motivation to acquire knowledge over health .reduce and eliminate the disparities in the people that includes race , gender , ethnicity ,income and disability. The changes and policy strategies are designed to target whole national’s health rather than individuals by modifying physical and organizational strctures.example of such modification includes enhancing opportunities to engage in physical activity by providing onsite facilities for exercises. The educational and informational strategies attempt to build the knowledge to inform the necessity of optimal health practice. Information and learning experiences voluntary adaptations towards conductive behavior of health. This can be done by providing information in internet, posters, pamphlets, health and nutrition software’s and providing information regarding healthy diet and exercise. Behavioral and social strategies will influence the behaviors indirectly by targeting individual’s awareness, self – efficacy, perceived support and interntions.this can include social environment to provide support for the people to maintain weight changes. Such interventions can involve group behavioral counseling. The Vision of healthy people 2020: “A society in which all people live long , Healthy lives “, So the barriers to health service includes lack of availability, Increased cost, lack...

Words: 2526 - Pages: 11

Premium Essay

Au2 Blueprint

...Advanced External Auditing [AU2] Examination Blueprint 2013/2014 Purpose The Advanced External Auditing [AU2] examination has been constructed using an examination blueprint. The blueprint, also referred to as the test specifications, outlines the content areas covered on the examination and the weighting allotted to each content area. This document also lists the topics, the level of competence for each topic, and the related learning objectives and competencies. The learning objectives have been designed to ensure that the competencies are met. In addition, information is provided on the proportion of each question type presented in the examination (that is, multiple choice, quantitative problems, and so on). Use Candidates should use the examination blueprint to prepare for the course examination. The blueprint may not include all the topics listed in the course materials; however, candidates are still responsible for acquiring a broad-based knowledge of all topics not listed in the blueprint since these topics will be tested in assignment and review questions. The topics not listed in the blueprint will also provide candidates with a greater depth of understanding of auditing concepts. Examination Objectives The objective of the 4-hour comprehensive examination is to test CGA candidates on the prerequisite knowledge required for advancement into PA1 and PA2, so as to ensure that the candidates have the broad-based knowledge in assurance needed to function properly in the association’s...

Words: 7165 - Pages: 29

Premium Essay

Henry's Daughters

...Study Guide for Henry’s Daughters (Without Graphics) Produced and distributed by the National Institute for Engineering Ethics Murdough Center for Engineering Professionalism Edward Whitacre College of Engineering Texas Tech University, Lubbock, Texas [pic] Copyright © 2010 Henry’s Daughters is designed to raise awareness of the ethical aspects of engineering work, advance knowledge and understanding of professional standards and public obligations and expectations, improve skills in moral reasoning, and strengthen personal dedication to exemplary conduct. Henry’s Daughters is dedicated to the memory of E. D. “Dave” Dorchester, P.E. Past President, National Institute for Engineering Ethics; Past President, Texas Society of Professional Engineers Past Chair, Texas Board of Professional Engineers; Distinguished Life Member, NIEE Executive Board Dave was highly influential in promoting NIEE and Murdough Center ethics programs. In 1989, he established the Professional Development Program of the Texas Board of Professional Engineers. As NIEE President, Dave worked with Dean Bill Marcy to bring NIEE to Texas Tech University. and E. Walter LeFevre, Ph.D., P.E. Past President, National Society of Professional Engineers; Fellow, National Society of Professional Engineers Past Director, Vice President and Fellow, ASCE; Past President, Arkansas Professional Engineers Board; Distinguished Life Member, NIEE Executive Board Walt was the longest standing...

Words: 4453 - Pages: 18

Premium Essay

Dvanced External Auditing [Au2] Examination Blueprint 2013/2014

...Advanced External Auditing [AU2] Examination Blueprint 2013/2014 Purpose The Advanced External Auditing [AU2] examination has been constructed using an examination blueprint. The blueprint, also referred to as the test specifications, outlines the content areas covered on the examination and the weighting allotted to each content area. This document also lists the topics, the level of competence for each topic, and the related learning objectives and competencies. The learning objectives have been designed to ensure that the competencies are met. In addition, information is provided on the proportion of each question type presented in the examination (that is, multiple choice, quantitative problems, and so on). Use Candidates should use the examination blueprint to prepare for the course examination. The blueprint may not include all the topics listed in the course materials; however, candidates are still responsible for acquiring a broad-based knowledge of all topics not listed in the blueprint since these topics will be tested in assignment and review questions. The topics not listed in the blueprint will also provide candidates with a greater depth of understanding of auditing concepts. Examination Objectives The objective of the 4-hour comprehensive examination is to test CGA candidates on the prerequisite knowledge required for advancement into PA1 and PA2, so as to ensure that the candidates have the broad-based knowledge in assurance needed to function properly in the association’s...

Words: 7165 - Pages: 29

Free Essay

Level of Awarness in Green Practices

...TABLE OF CONTENTS THE PROBLEM AND ITS SCOPE INTRODUCTION Rationale Theoretical Background THE PROBLEM Statement of the Problem Significance of the Study RESEARCH METHODOLOGY Research Method Research Environment Research Respondents Research Instruments Research Procedure Gathering of Data Treatment of Data Research Flow DEFINITION OF TERMS ORGANIZATION OF THE STUDY BIBLIOGRAPHY APPENDICES Appendix A:Transmittal Letters Appendix B: Location Map Appendix C: Cover Letter Appendix D: Sample Questionnaire Appendix E: Timetable CURRICULUM VITAE Rationale The debate over "high-tech" or "high-touch" is largely a thing of the past in the hotel industry as emerging state of the art technologies drive unprecedented change in the way hotels operate and serve customers. It is clear that investments in technologies can generate greatly improved operating efficiencies, higher hotel revenues and enhanced guest services. The pace of change, however, has been so extreme as to leave many hotel organizations uncertain about what types of technology to adopt and the best ways to create a seamless integration of systems company-wide. In the current climate of reduced revenues and cutbacks in expenditures, introducing new products to the hospitality market is more difficult than ever. Companies in the hospitality industry around the world face a highly competitive environment in which differentiation and innovative customer experiences are key elements in improving...

Words: 4881 - Pages: 20

Premium Essay

Pa2 Blueprint

...PA2 EXAMINATION BLUEPRINT 2011/2012 Effective Date: December 2011 This document is the property of: CGA-Canada 100-4200 North Fraser Way Burnaby, British Columbia Canada V5J 5K7 Phone: 604 669-3555 Fax: 604 689-5845 www.cga.org/canada Updated: April 18, 2011 CGA-Canada PA2 Examination Blueprint 2011/2012 Table of Contents About the Examination Blueprint ......................................................................................................................... 2 PA2 Examination ................................................................................................................................................... 2 PA2 Course ........................................................................................................................................................ 2 Prerequisite Courses for the PA2 Examination .................................................................................................. 3 Competency Weightings ....................................................................................................................................... 3 Structure of the Examination ................................................................................................................................ 5 Examination Competency Coverage ..................................................................................................................... 6 Scoring Model and Evaluation of Candidate Performance .......

Words: 4762 - Pages: 20

Premium Essay

Pa1 Blueprint

...PA1 EXAMINATION BLUEPRINT 2014/2015 Effective Date: December 2014 This document is the property of: CGA-Canada 100-4200 North Fraser Way Burnaby, British Columbia Canada V5J 5K7 Phone: 604 669-3555 Fax: 604 689-5845 www.cga.org/canada Updated: January 21, 2014 CGA-Canada PA1 Examination Blueprint 2014/2015 Table of Contents About the Examination Blueprint ......................................................................................................................... 2 PA1 Examination ................................................................................................................................................... 2 PA1 Course ........................................................................................................................................................ 2 Prerequisite Courses for the PA1 Examination .................................................................................................. 3 Competency Weightings ....................................................................................................................................... 3 Structure of the Examination ................................................................................................................................ 5 Examination Competency Coverage ..................................................................................................................... 6 Scoring Model and Evaluation of Candidate...

Words: 4745 - Pages: 19

Free Essay

Essay

...IFSM 304 – Ethics in the Information Age Learning Portfolio Assignment Descriptions Here are the detailed Assignment Requirements and Summary (Reflection Paper) that comprise activities for a Learning Portfolio for IFSM 304. These activities, along with class discussion and any other assignments your professor may require will enable you to achieve the course objectives and demonstrate knowledge of key concepts and apply this understanding to real-world digital ethics topics and situations. Understand that your work will comprise a Learning Portfolio for the course and these assignments are linked! You will be faced with work that advances with a progression from a general basic framework for decision making to more specific analysis and critical thinking about more complex ethical issues. Current Events 5% Conference Posting of articles on IT-related Ethical Global issues (multi-national corporation) The purpose of this assignment is to analyze a current event article on global ethical issues from a multi-national corporation perspective. This assignment is designed to increase your knowledge from a corporate viewpoint and enable you to analyze ethical issues from a current GLOBAL situation or event. This will also enhance your research and writing skills and your critical-thinking abilities. Select a current topic (2010 source or later) and find an appropriate article on the topic. Provide the persistent URL (one that anyone can click on to read the...

Words: 3771 - Pages: 16

Premium Essay

Information Security Policy in Malaysia.

...Introduction Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Governments, military, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. Should confidential information about a businesses customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to lost business, law suits or even bankruptcy of the business. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement. For the individual, information...

Words: 6195 - Pages: 25

Premium Essay

Quality Assurance in It

... Developing a Quality Assurance (QA) Plan: As indicated in Question 6, this step should be implemented by, initially having an exploration phase. In this phase, the client comes up with the procedures that ensures that quality assurance is present in the project. For instance, when having a robust and secure system, the performance of the system should be constant so that no system downtime will take place. Here, one must take into consideration whether the stakeholders have experience with some new software or other kinds of resources or not. It will also involve risk assessment. Risk assessment will be divided into the following five steps: 1) Determine what will endanger the system. – This will be done by observing the workplace environment. The observation will involve walking around and look at what could rationally be harmed, asking employees what they think so...

Words: 6690 - Pages: 27

Premium Essay

Windows 10 Introduction

...Introducing Windows 10 for IT Professionals Technical Overview ED BOTT PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright 2016 © Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-0-7356-9697-6 Printed and bound in the United States of America. First Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at mspinput@microsoft.com. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/ Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions Editor: Rosemary Caperton Project Editor: Christian Holdener; S4Carlisle Publishing Services Editorial Production:...

Words: 48336 - Pages: 194

Premium Essay

Anti-Theft System

...Implementation and Development of Vehicle Tracking and Immobilization Technologies MTI Report 09-04 MINETA TRANSPORTATION INSTITUTE The Norman Y. Mineta International Institute for Surface Transportation Policy Studies (MTI) was established by Congress as part of the Intermodal Surface Transportation Efficiency Act of 1991. Reauthorized in 1998, MTI was selected by the U.S. Department of Transportation through a competitive process in 2002 as a national “Center of Excellence.” The Institute is funded by Congress through the United States Department of Transportation’s Research and Innovative Technology Administration, the California Legislature through the Department of Transportation (Caltrans), and by private grants and donations. The Institute receives oversight from an internationally respected Board of Trustees whose members represent all major surface transportation modes. MTI’s focus on policy and management resulted from a Board assessment of the industry’s unmet needs and led directly to the choice of the San José State University College of Business as the Institute’s home. The Board provides policy direction, assists with needs assessment, and connects the Institute and its programs with the international transportation community. MTI’s transportation policy work is centered on three primary responsibilities: Research MTI works to provide policy-oriented research for all levels of government and the private sector to foster the development of optimum surface...

Words: 21989 - Pages: 88