Biometrics And How It Pertains To IT Security Research Proposal

PAGES
2
WORDS
502
Cite

¶ … Biometrics Relates to IT Security Enterprises are more reliant on their information assets and computer systems than factory machinery or production equipment. Ironically these fixed assets of companies are protected more effectively than the main IT systems of a business. While there are a myriad of security technologies available today, biometrics shows the most potential for creating and sustaining a unified, enterprise wide security for a company's IT and information assets better than any other (Crosbie, 2005). The intent of this research design and methodology is to define the financial and operational benefits of biometrics being used as an integral component of an enterprise IT security strategy.

Biometric Components and their Implications

Implementing an enterprise-wide biometric system requires a model-centric approach over using a process-based approach to securing IT systems, information and the knowledge they deliver. Model-based biometrics are more secure and scale beyond the limits of traditional IT technologies as these latter approaches rely on a role-based authentication alone (Wang, Liu, Shyu, 2013). Using a model-based authentication approach that is based on IT professionals' biometrics, an added dimension is provided to role assignments where each member of a team can be assigned access to a specific asset or series of reports (Wang, Liu, Shyu, 2013). The model-based approach...

...

These attributes include universality, uniqueness, permanence, measurability, performance, acceptability and circumvention (Matyas, Stapleton, 2000). The emergence of standards in this area is designed to unify these attributes into a scalable, secure framework yet also pertain the agility and time-to-market that is essential for enterprises to make these attributes relevant to their needs (Wang, Liu, Shyu, 2013). Today there is no clear quantifications of the financial and operational performance metrics for biometrics across all seven attributes.
Research Objectives and Hypotheses

1. To determine the financial and operational performance measures of performance that biometrics is delivering to enterprises who have standardized on this technology today.

2. To determine how the seven attributes that form the foundation of biometric theory can be organized into a standard definition hat abides by the existing industry frameworks.

Research Technique

The research technique will be based on a thorough literature review of all peer revised empirical research generated over the last 12 months. This time constraint is essential as the field of biometrics is quickly changing,…

Sources Used in Documents:

Resources:

Crosbie, M. (2005). Biometrics for enterprise security. Network Security, 2005(11), 4-8.

Matyas, Stephen M, Jr., & Stapleton, J. (2000). A biometric standard for information management and security. Computers & Security, 19(5), 428-441.

Wang, J., Liu, C., & Shyu, J.Z. (2013). Biometrics technology evaluating and selecting model building. Technology Analysis & Strategic Management, 25(9), 1067.


Cite this Document:

"Biometrics And How It Pertains To IT Security" (2014, November 29) Retrieved April 27, 2024, from
https://www.paperdue.com/essay/biometrics-and-how-it-pertains-to-it-security-2153016

"Biometrics And How It Pertains To IT Security" 29 November 2014. Web.27 April. 2024. <
https://www.paperdue.com/essay/biometrics-and-how-it-pertains-to-it-security-2153016>

"Biometrics And How It Pertains To IT Security", 29 November 2014, Accessed.27 April. 2024,
https://www.paperdue.com/essay/biometrics-and-how-it-pertains-to-it-security-2153016

Related Documents

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

The reality is however that legacy systems pose the greatest potential risk to any enterprise, as these platforms are anachronistic in terms of security support, lack many common safeguards, and don't have the necessary Application Programmer Interfaces (APIs) to scale globally as a secured platform (Gupta, Roth, 2007). Legacy systems were designed in an era where single authentication for an entire enterprise system was sufficient enough, and the concept

Some Key applications are:Physical Acces facility and secure-area access, time-and-attendance monitoring. Growth: Flat, starting at 13% of total market revenues and ending at 14%. Logical Access: PC, networks, mobile devices, kiosks, accounts. Growth: From 21% to 31% of total market revenues. Identity Services: Background check enrollment, credentialing, document issuance. Growth: Decline from 65% to 47% of total market revenues. Surveillance and Monitoring: Time and attendance, watchlists. Growth: From less

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

The truth of the matter is the biometric templates for identity enrolment that are stored on a server are not in the real since images rather they are mathematical representations of the data points that the biometric algorithm is able to extract from the scanned fingerprint, finger vein, palm vein or iris. The identifying template is a binary file that has a series of zeros and ones. The algorithm then

Cryptography
PAGES 15 WORDS 4153

In addition electronic purses can be reloaded using ATM machines or traditional tellers (if the card is connected to a banking account). Additionally, electronic purses are usually based on smart card technology and necessitate a card reader to fulfill a transaction. Equipment including point of sale (POS) terminals, ATMs, and smart card kiosks can be outfitted with card readers (Misra et al., 2004). Every time the user utilizes the card