Biometric Controls Biometric Cost Analysis There Are Essay

Biometric Controls Biometric Cost Analysis

There are some questions that will help determine the cost benefit analysis of a new biometric system (Cooper). The level of security, the level of reliability, need of backup, the acceptable time for enrollment, level of privacy, and storage needed are things that need to be determined first. Will the system be attended or not? Does the system need to be resistant to spoofing? Will the system operate 24 hours a day? The system will need to be designed based on the individual organization's needs.

Fingerprint devices are low in cost, can be placed on a smartcard, have a low rate of fraudulent users, and are easy to integrate. They operate on the grooves and ridges naturally embedded in the skin to detect the uniqueness of the finger. They also have a higher risk of false rejection and degradation of the fingerprint due to occupation or injury. The error rate is 1/500. The devices would need to be replaced periodically due to grime buildup over time. The use of smartcards would eliminate some need for system storage and put the protection of...

...

But, smartcards can be lost or stolen. The smartcards would need to be encrypted and used with another measure to be really effective against intrusion. If the smartcards are not used, the system would need more storage and a strong security system, firewall, antivirus, malware, etc., as well as strong policies, employee training for security measures and continual monitoring. To prevent spoofing, the system would need aliveness detection to ensure rejection of a dead finger or a fake one.
Hand geometry devices are easy to use and integrate into a system, the hand does not significantly change with aging, is used to improve security, accuracy, and convenience for control, time, and attendance, and can work with dirty hands. The hand geometry device measures the parameter, diameter and length, of the hand and fingers. Injury can cause degradation and make the print hard to read. The parameter is unique, but not the hand itself. It does not work well with arthritis, the accuracy is low, and it is fairly expensive. The false rejection rate (FRR) is…

Sources Used in Documents:

Bibliography

Cooper, J.A. (n.d.). Did I Do That? Retrieved from Information Security Writers: http://www.infosecwriters.com/test_resources/pdf/JCooper_Biometrics.pdf

Francese, A. (2008, Oct 23). Tips for Buying a Retinal Biometric Scanner. Retrieved from Yahoo Voices: http://voices.yahoo.com/tips-buying-retinal-biometric-scanner-2081642.html?cat=15

Vandana, R. & . (n.d.). Feature Selection for Hand-Geometry-based Person Authentication. Retrieved from Centre for Visual Information Technology: http://cit.iiit.ac.in/papers/vandana05Feature.pdf

Zorkadis, V. & . (2004). On biometrics-based authentication and identification from a privacy-protection perspective: Deriving Privacy-enhacing requirements. Information Management and Computer Security 12.1, 125-137.


Cite this Document:

"Biometric Controls Biometric Cost Analysis There Are" (2012, May 21) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/biometric-controls-biometric-cost-analysis-111488

"Biometric Controls Biometric Cost Analysis There Are" 21 May 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/biometric-controls-biometric-cost-analysis-111488>

"Biometric Controls Biometric Cost Analysis There Are", 21 May 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/biometric-controls-biometric-cost-analysis-111488

Related Documents

Forensics: Signature Analysis Forensic examination and analysis of writer identification and verification are reported as having "applications in various domains. Especially in the field of biometric recognition. Forensic Document Examination (FED) is a process that clarifies the writer of a handwritten document. Applications included are signatures verification. FED is such that is reported to have been based primarily on manual examination by experts with only recent automation of analysis methods being

Risk Management Risk and vulnerability analysis Risk can be defined as a prediction of future events and their outcomes and consequences. Initially, as these predictions are being made, there is no guarantee that these event will actually occur. At this point, it becomes vital to apply probabilities in order to determine the likelihood of the event occurring. Risk analysis, therefore, is a process of describing risks involved in any situation or organization.

The Blue Cross Blue Shield of Tennessee settled for $1.5 million on a HIPAA breach of privacy case. The HHS website outlines the particulars of this case. There were 57 unencrypted hard drives that were stolen from a facility. These contained personal health care information on over 1 million individuals, so the fine was like a buck fifty per person, and was probably less than it would have cost the

Spatial tracking systems that make banks' floor plans and product positioning more effective; 5. Intelligent interactive displays that reflect the interests of the watcher; 6. Use of wireless tablet personal computers (PCs) for client interviewing; and, 7. Videoconference virtual experts for collaborative selling (56). The same features that characterize high performance banks in their brick-and-mortar operations appear to relate to the use of technology as well, with the best performing banks having identified

In addition to the stability, scalability and extensibility of its architecture, cloud platform have made it possible for workflows across government to become more pervasive and secure as a result [4]. The TCO of a given cloud platform or series of applications therefore has continued to become reduced by the experience effect (comparable to economies of scale yet only applied to data aggregated and knowledge creation) across government [6]. This

On one hand, this may alter the consumers' trust in the company's products which are perceived as intangible compared with those goods that can be purchased from the shelves of specialized stores. On the other hand, resorting to intermediaries implies paying a certain commission which results in higher prices for the respective products. Moreover, the success of selling through indirect channels depends, to a great extent, on the distributors'