Verified Document

Biometrics And How It Pertains To IT Security Research Proposal

¶ … Biometrics Relates to IT Security Enterprises are more reliant on their information assets and computer systems than factory machinery or production equipment. Ironically these fixed assets of companies are protected more effectively than the main IT systems of a business. While there are a myriad of security technologies available today, biometrics shows the most potential for creating and sustaining a unified, enterprise wide security for a company's IT and information assets better than any other (Crosbie, 2005). The intent of this research design and methodology is to define the financial and operational benefits of biometrics being used as an integral component of an enterprise IT security strategy.

Biometric Components and their Implications

Implementing an enterprise-wide biometric system requires a model-centric approach over using a process-based approach to securing IT systems, information and the knowledge they deliver. Model-based biometrics are more secure and scale beyond the limits of traditional IT technologies as these latter approaches rely on a role-based authentication alone (Wang, Liu, Shyu, 2013). Using a model-based authentication approach that is based on IT professionals' biometrics, an added dimension is provided to role assignments where each member of a team can be assigned access to a specific asset or series of reports (Wang, Liu, Shyu, 2013). The model-based approach...

These attributes include universality, uniqueness, permanence, measurability, performance, acceptability and circumvention (Matyas, Stapleton, 2000). The emergence of standards in this area is designed to unify these attributes into a scalable, secure framework yet also pertain the agility and time-to-market that is essential for enterprises to make these attributes relevant to their needs (Wang, Liu, Shyu, 2013). Today there is no clear quantifications of the financial and operational performance metrics for biometrics across all seven attributes.
Research Objectives and Hypotheses

1. To determine the financial and operational performance measures of performance that biometrics is delivering to enterprises who have standardized on this technology today.

2. To determine how the seven attributes that form the foundation of biometric theory can be organized into a standard definition hat abides by the existing industry frameworks.

Research Technique

The research technique will be based on a thorough literature review of all peer revised empirical research generated over the last 12 months. This time constraint is essential as the field of biometrics is quickly changing,…

Sources used in this document:
Resources:

Crosbie, M. (2005). Biometrics for enterprise security. Network Security, 2005(11), 4-8.

Matyas, Stephen M, Jr., & Stapleton, J. (2000). A biometric standard for information management and security. Computers & Security, 19(5), 428-441.

Wang, J., Liu, C., & Shyu, J.Z. (2013). Biometrics technology evaluating and selecting model building. Technology Analysis & Strategic Management, 25(9), 1067.
Cite this Document:
Copy Bibliography Citation

Related Documents

Virtualization and Biometrics As Etzioni
Words: 1430 Length: 3 Document Type: Article Review

Some Key applications are:Physical Acces facility and secure-area access, time-and-attendance monitoring. Growth: Flat, starting at 13% of total market revenues and ending at 14%. Logical Access: PC, networks, mobile devices, kiosks, accounts. Growth: From 21% to 31% of total market revenues. Identity Services: Background check enrollment, credentialing, document issuance. Growth: Decline from 65% to 47% of total market revenues. Surveillance and Monitoring: Time and attendance, watchlists. Growth: From less

Computer Security People, Process and Technology Are
Words: 4780 Length: 15 Document Type: Capstone Project

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Cryptography
Words: 4153 Length: 15 Document Type: Term Paper

In addition electronic purses can be reloaded using ATM machines or traditional tellers (if the card is connected to a banking account). Additionally, electronic purses are usually based on smart card technology and necessitate a card reader to fulfill a transaction. Equipment including point of sale (POS) terminals, ATMs, and smart card kiosks can be outfitted with card readers (Misra et al., 2004). Every time the user utilizes the card

Sar Teams That Responded to
Words: 1135 Length: 3 Document Type: Essay

Personal freedoms and choice to say is all well and good, but forced evacuations should have been done and the parking lots full of empty buses prove that this can and should have been done had anyone had the temerity to do it. The state of Louisiana and the city of New Orleans should fully implement the NRF/NRP frameworks so as to prepare for the next storm, which will

Terrorism Tech Technological Innovation As
Words: 4295 Length: 15 Document Type: Thesis

The foolishness of this reversal of priorities would be clearly demonstrated in the contrast between the results of intelligence efforts on 9/11 and those just two years prior. After the resignation of Tenet, who submitted as his official reason for departure the desire to spend more time with his family, his spokesman noted that "no one in the U.S. government was more aggressive in calling attention to and dealing with

ISO the International Organization for
Words: 3770 Length: 14 Document Type: Research Proposal

" As it applies specifically to the ISO 9001:2008 which replaced the ISO9002: 1994, the ISO 9001 concerns itself with quality management. In fact it is a quality management system that establishes various requirements ("ISO 9001:2008"). In order to gain certification the organization must: 1. Demonstrate its capacity to consistently offer product that meets customer and applicable statutory and regulatory requirements ("ISO 9001:2008"). 2. Plan to improve customer satisfaction through the effective application

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now