Biometric Analysis Paper

Improved Essays
Introduction

This paper includes a memorandum requesting consideration of a blended biometric solution for a specific company. Included in the memorandum is an analysis of the blended attacks that have occurred against the organization and the risks associated with the attacks. This memorandum is to include recommendations for best practices for blended biometric solutions that should be implemented both foreign and domestic by the security administrators for marginalization and prevention.

December 04, 2016
MEMORANDUM TO: Executive Leadership
FROM: Samanthea L. Price, Information Security Manager DATE: December 10, 2016
SUBJECT: Proposed Implementation of Biometrics Authentication Solution for SLP Information Technologies, Inc. Background SLP, Inc has been using biometrics since the 1970s, and with improvements in the technologies used to collect and share this information, SLP, Inc’s use of biometrics has increased. This method of access identification increased, reports have called on SLP, Inc to improve its management of biometrics activities and, over time, SLP, Inc has taken some key actions. Meanwhile, a new concept called identity management is emerging of which authentication biometrics is an integral part.
…show more content…
Included in this memorandum is a history of biometrics along with information in regards to the blended attacks that have occurred recently within the organization both internationally and domestically. Therefore, a blended biometric solution is recommended for the SLP, Inc. organization to strengthen authentication identification for identity its management. The blended biometric solution recommended is Fingerprinting and Retina or Iris Scans. Implementing this blended or combined biometric solution is less expensive comparatively to the combination of other solutions researched such as Face Recognition, Hand Geometry, and Signature Identification. Biometrics Background According to Bidgoli, (2012), physiological elements are used in biometric authentication to security measures Bidgoli, (2012). Bidgoli, (2012) Portend biometric methods have characteristics not included or available in other security measures Bidgoli, (2012). Solutions for identity and authentication need to be easy to implement wherever authentication is required. Implementing identity and authentication security measures allow organizations to optimize security and mitigate authentication risks. SLP, Inc. has incorporated controls attempting to secure systems with strong authentication methods with the use of biometric technology. These efforts sometimes cause issues for the SLP, Inc. user, and other entry methods found which may increase the risk to the security of the organization’s data and information. The most recent authentication identification methods used by SLP, Inc. have been the use of Tokens and Password or Pins. Recent studies have shown that organizations …show more content…
In the end, what may prove most useful is the mix of biometric methods. Sophisticated computer network attacks that increase human resource, maintenance and operation costs prompt the need for more advanced security techniques. Without added measures of security, the networks of organizations everywhere will be increasingly susceptible to additional types of attacks.
Biometrics involves being able to compare objects and determining if there is a match.
Biometric authentication captures an image and builds a template of the image to be used for future comparison. Biometric templates are outlines of images stored in a database located on a server. After a blended biometric template has been built and securely stored on a server within a database, the biometric template is scanned into a system in a request for access. When access is requested, the template is recalled and compared to what is located on the network server as described by the template. When a match is identified, access is granted, and if not then access is denied.
Blended Attacks

Related Documents

  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Cms Standard 482.23 Essay

    • 1198 Words
    • 5 Pages

    In the hospital I am an administrator at, I have decided to utilize the CMS standard 482.23(c)(6). I will discuss how I will put into practice this procedure in order to meet the conditions of CMS and the Joint Commission. I will discuss how I will incorporate this new fingerprint device for nurses on the bedside in accordance with CMS and the Joint Commission. The Joint Commission and CMS standard 482.23(c)(6) is defined as “The hospital may allow a patient (or his or her caregiver/support person where appropriate) to self-administer both hospital-issued medications and the patient’s own medications brought into the hospital, as defined and specified in the hospital’s policies and procedures” (“Joint Commission and CMS crosswalk”, p. 183).…

    • 1198 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    MIS101: Assignment

    • 559 Words
    • 3 Pages

    MIS101 – Assignment Template – Trimester 1, 2015 Your Name: Costa Banias Student Number: 215162709 Deakin Email: cbanias@deakin.edu.au Assignment – Part A Question 1: Provide a brief explanation of each of the following security terms and provide an example of each. (~250 Words) o Something the user is, also known as biometrics is a type of authentication system that examines person’s natural physical characteristics. There are various applications that can be undertaken such as retina scans, fingerprint scans, facial recognition and iris scans.…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    James Earl Ray Case Study

    • 589 Words
    • 3 Pages

    Actually, the evidence found did point to James Earl Ray as the perpetrator of the crime and no other evidence other than claims of a conspiracy were found at the scene. However, there were some weaknesses in the prosecution’s case, the two witnesses at the rooming house could not identify the man they saw running from the bathroom after the shot. Nor could they match the gun to the mangled bullet that killed Doctor Martin Luther King (Polk, 2008). A confession of this crime helped the prosecutors put James Earl Ray behind bars and kept him there until his death. Nevertheless, I believe a good prosecutor could win this case.…

    • 589 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The article then goes on to talk about the current ways that we are using technology in biometrics. These include voice, DNA, facial features, and more.…

    • 475 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In 1996, United States Congress passed the Health Insurance Portability and Accountability Act (HIPAA) as a way for Americans to continue with health care insurance during a job transition and reduce health care fraud and abuse (California Department of Health Care Services, 2015). Providing health care services at the administrative level, the organization is responsible for protecting the individuals served private information when working with other health care providers and those supporting the individual needs. In this analysis the origins and impact of HIPAA/Private Health Information (PHI) while serving individuals with Intellectual Developmental Disabilities will be discussed, along with Bardach’s eightfold process of HIPPA/PHI and…

    • 1101 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    In creating these programs, the NIJ uses a comprehensive process to make valid technology programs for the criminal justice system. This process uses the research, development, testing, and evaluation approach to “ensure that the NIJ’s research portfolios are aligned to the best technology needs of the criminal justice community,” (Justice, 2009). For example, the NIJ formed a working group to study some of the disadvantages of the praised specialized database, the AFIS. The Automated Fingerprint Identification System (AFIS) is a specialized database that is designed to match known and unknown fingerprints with intentions on connecting a suspect to a pending crime or to an unsolved crime. The Integrated AFIS has a hierarchical structure that is perpetuated throughout the United States.…

    • 992 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    V-Care Security Solutions

    • 150 Words
    • 1 Pages

    V-Care Security Solutions We live in a society with a perceived threat from numerous sources. These threats are now a reality that faces us on a daily basis. We are put through metal detectors as we enter airports, multiplex or malls. Our society must be shielded from planned and random incidents that threaten to throw our fast pace of life out of gear.…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    1) Introduction I plan to work in a lab that will be using biometric operations to solve the identity of a specific individual. The Next Generation Identification System (which will further be referred to as NGI) allows for those of us needing to identify suspects on a national based system and allow for improved accuracy compared to the original Integrated Automatic Identification System (which will further be referred to as IAFIS). This change happened “…on September 7, 2014, when the FBI’s Criminal Justice Information Services (CJIS) Division officially decommissioned the 15-year-old Integrated Automated Fingerprint Identification System (IAFIS) and, in turn, deployed the Next Generation Identification (NGI) system” (Adams 171). As this…

    • 1387 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    In the future, an all-in-one platform will be provided to the cops that will cater all the requirements of a cop. The policemen will be provided with a direct access to biometric data of the particular region so that concealing ones identity becomes nearly impossible for anyone. The already existing biometric data storage and identification process has many loop holes. It is predicted that in future this technology will be improved to higher levels ensuring personal privacy intact and precise levels of findings.…

    • 1028 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays