Verified Document

Biometric Controls Biometric Cost Analysis There Are Essay

Biometric Controls Biometric Cost Analysis

There are some questions that will help determine the cost benefit analysis of a new biometric system (Cooper). The level of security, the level of reliability, need of backup, the acceptable time for enrollment, level of privacy, and storage needed are things that need to be determined first. Will the system be attended or not? Does the system need to be resistant to spoofing? Will the system operate 24 hours a day? The system will need to be designed based on the individual organization's needs.

Fingerprint devices are low in cost, can be placed on a smartcard, have a low rate of fraudulent users, and are easy to integrate. They operate on the grooves and ridges naturally embedded in the skin to detect the uniqueness of the finger. They also have a higher risk of false rejection and degradation of the fingerprint due to occupation or injury. The error rate is 1/500. The devices would need to be replaced periodically due to grime buildup over time. The use of smartcards would eliminate some need for system storage and put the protection of...

But, smartcards can be lost or stolen. The smartcards would need to be encrypted and used with another measure to be really effective against intrusion. If the smartcards are not used, the system would need more storage and a strong security system, firewall, antivirus, malware, etc., as well as strong policies, employee training for security measures and continual monitoring. To prevent spoofing, the system would need aliveness detection to ensure rejection of a dead finger or a fake one.
Hand geometry devices are easy to use and integrate into a system, the hand does not significantly change with aging, is used to improve security, accuracy, and convenience for control, time, and attendance, and can work with dirty hands. The hand geometry device measures the parameter, diameter and length, of the hand and fingers. Injury can cause degradation and make the print hard to read. The parameter is unique, but not the hand itself. It does not work well with arthritis, the accuracy is low, and it is fairly expensive. The false rejection rate (FRR) is…

Sources used in this document:
Bibliography

Cooper, J.A. (n.d.). Did I Do That? Retrieved from Information Security Writers: http://www.infosecwriters.com/test_resources/pdf/JCooper_Biometrics.pdf

Francese, A. (2008, Oct 23). Tips for Buying a Retinal Biometric Scanner. Retrieved from Yahoo Voices: http://voices.yahoo.com/tips-buying-retinal-biometric-scanner-2081642.html?cat=15

Vandana, R. & . (n.d.). Feature Selection for Hand-Geometry-based Person Authentication. Retrieved from Centre for Visual Information Technology: http://cit.iiit.ac.in/papers/vandana05Feature.pdf

Zorkadis, V. & . (2004). On biometrics-based authentication and identification from a privacy-protection perspective: Deriving Privacy-enhacing requirements. Information Management and Computer Security 12.1, 125-137.
Cite this Document:
Copy Bibliography Citation

Related Documents

Risk and Vulnerability Analysis
Words: 1408 Length: 4 Document Type: Research Paper

Risk Management Risk and vulnerability analysis Risk can be defined as a prediction of future events and their outcomes and consequences. Initially, as these predictions are being made, there is no guarantee that these event will actually occur. At this point, it becomes vital to apply probabilities in order to determine the likelihood of the event occurring. Risk analysis, therefore, is a process of describing risks involved in any situation or organization.

BCBST HIPAA Violation Case Analysis
Words: 863 Length: 3 Document Type: Term Paper

The Blue Cross Blue Shield of Tennessee settled for $1.5 million on a HIPAA breach of privacy case. The HHS website outlines the particulars of this case. There were 57 unencrypted hard drives that were stolen from a facility. These contained personal health care information on over 1 million individuals, so the fine was like a buck fifty per person, and was probably less than it would have cost the

Marketing Plan Aimed at Launching
Words: 3583 Length: 11 Document Type: Term Paper

On one hand, this may alter the consumers' trust in the company's products which are perceived as intangible compared with those goods that can be purchased from the shelves of specialized stores. On the other hand, resorting to intermediaries implies paying a certain commission which results in higher prices for the respective products. Moreover, the success of selling through indirect channels depends, to a great extent, on the distributors'

Information Security
Words: 2504 Length: 8 Document Type: Term Paper

Security The following will look at case review questions based on the book known as Principles of Information Security by Michael E. Whitman. Chapters 4, 5, 6, and 7 were read through and case questions were given for each of these chapters. Case review question answers will be incorporated with material from the chapter reading that accompanies it. Chapter 4's introduction has a scenario of a man known as Charlie. He

Pharmacy Information Security Information Security in Pharmacies
Words: 2962 Length: 10 Document Type: Essay

Pharmacy Information Security Information Security in Pharmacies Information security is vital in many firms especially pharmacies and other sensitive fields. Security officers are, therefore, necessary to ensure both physical and logical safety. The Information Security Officer/Manager (ISO) will have different duties such as managing the information security functions in according to the firm's established guidelines and provisions/policies, providing reports to the firm's management at reasonable intervals, establishing and ensuring implementation of information

Schneck Medical Center: The Baldrige Award Schneck
Words: 3190 Length: 10 Document Type: Capstone Project

Schneck Medical Center: The Baldrige Award Schneck Medical Center: Overview The Schneck Medical Center according to the National Institute of Standards and Technology -- NIST (2011) "is a 93-bed nonprofit hospital providing primary and specialized services to the residents of Jackson County, Ind., and surrounding communities." The facility as NIST (2011) further points out, offers a variety of primary care services including but not limited to cancer care, noninvasive cardiac care, and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now