Biometric Analysis Paper

Improved Essays
Introduction

This paper includes a memorandum requesting consideration of a blended biometric solution for a specific company. Included in the memorandum is an analysis of the blended attacks that have occurred against the organization and the risks associated with the attacks. This memorandum is to include recommendations for best practices for blended biometric solutions that should be implemented both foreign and domestic by the security administrators for marginalization and prevention.

December 04, 2016
MEMORANDUM TO: Executive Leadership
FROM: Samanthea L. Price, Information Security Manager DATE: December 10, 2016
SUBJECT: Proposed Implementation of Biometrics Authentication Solution for SLP
…show more content…
Included in this memorandum is a history of biometrics along with information in regards to the blended attacks that have occurred recently within the organization both internationally and domestically. Therefore, a blended biometric solution is recommended for the SLP, Inc. organization to strengthen authentication identification for identity its management. The blended biometric solution recommended is Fingerprinting and Retina or Iris Scans. Implementing this blended or combined biometric solution is less expensive comparatively to the combination of other solutions researched such as Face Recognition, Hand Geometry, and Signature …show more content…
In the end, what may prove most useful is the mix of biometric methods. Sophisticated computer network attacks that increase human resource, maintenance and operation costs prompt the need for more advanced security techniques. Without added measures of security, the networks of organizations everywhere will be increasingly susceptible to additional types of attacks.
Biometrics involves being able to compare objects and determining if there is a match.
Biometric authentication captures an image and builds a template of the image to be used for future comparison. Biometric templates are outlines of images stored in a database located on a server. After a blended biometric template has been built and securely stored on a server within a database, the biometric template is scanned into a system in a request for access. When access is requested, the template is recalled and compared to what is located on the network server as described by the template. When a match is identified, access is granted, and if not then access is denied.
Blended Attacks

Related Documents

  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    MIS101: Assignment

    • 559 Words
    • 3 Pages

    MIS101 – Assignment Template – Trimester 1, 2015 Your Name: Costa Banias Student Number: 215162709 Deakin Email: cbanias@deakin.edu.au Assignment – Part A Question 1: Provide a brief explanation of each of the following security terms and provide an example of each. (~250 Words) o Something the user is, also known as biometrics is a type of authentication system that examines person’s natural physical characteristics. There are various applications that can be undertaken such as retina scans, fingerprint scans, facial recognition and iris scans.…

    • 559 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cms Standard 482.23 Essay

    • 1198 Words
    • 5 Pages

    In the hospital I am an administrator at, I have decided to utilize the CMS standard 482.23(c)(6). I will discuss how I will put into practice this procedure in order to meet the conditions of CMS and the Joint Commission. I will discuss how I will incorporate this new fingerprint device for nurses on the bedside in accordance with CMS and the Joint Commission. The Joint Commission and CMS standard 482.23(c)(6) is defined as “The hospital may allow a patient (or his or her caregiver/support person where appropriate) to self-administer both hospital-issued medications and the patient’s own medications brought into the hospital, as defined and specified in the hospital’s policies and procedures” (“Joint Commission and CMS crosswalk”, p. 183).…

    • 1198 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    James Earl Ray Case Study

    • 589 Words
    • 3 Pages

    Actually, the evidence found did point to James Earl Ray as the perpetrator of the crime and no other evidence other than claims of a conspiracy were found at the scene. However, there were some weaknesses in the prosecution’s case, the two witnesses at the rooming house could not identify the man they saw running from the bathroom after the shot. Nor could they match the gun to the mangled bullet that killed Doctor Martin Luther King (Polk, 2008). A confession of this crime helped the prosecutors put James Earl Ray behind bars and kept him there until his death. Nevertheless, I believe a good prosecutor could win this case.…

    • 589 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    The Integrated Automated Fingerprint Identification System (IAFIS) is a national automated fingerprint identification and criminal history system maintained by the FBI.…

    • 95 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    In 1996, United States Congress passed the Health Insurance Portability and Accountability Act (HIPAA) as a way for Americans to continue with health care insurance during a job transition and reduce health care fraud and abuse (California Department of Health Care Services, 2015). Providing health care services at the administrative level, the organization is responsible for protecting the individuals served private information when working with other health care providers and those supporting the individual needs. In this analysis the origins and impact of HIPAA/Private Health Information (PHI) while serving individuals with Intellectual Developmental Disabilities will be discussed, along with Bardach’s eightfold process of HIPPA/PHI and…

    • 1101 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    V-Care Security Solutions

    • 150 Words
    • 1 Pages

    V-Care Security Solutions We live in a society with a perceived threat from numerous sources. These threats are now a reality that faces us on a daily basis. We are put through metal detectors as we enter airports, multiplex or malls. Our society must be shielded from planned and random incidents that threaten to throw our fast pace of life out of gear.…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    With the new system, “NGI has now taken fingerprints to the leading edge of human identification, as new resources are being placed in the hands of law enforcement officers so that they may more efficiently serve their communities” (Adams 175). These identifications based on fingerprints have become a major part of identification because of the advances on accuracy of the new system. Two specific systems used inside of NGI are Advanced Fingerprint Identification Technology (AFIT) and the Latent and National Palmprint system which will be discussed based on what it does, why it is used, and the accuracy of the system. These points will lead to a better understanding of why NGI is a better system than…

    • 1387 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    In the future, an all-in-one platform will be provided to the cops that will cater all the requirements of a cop. The policemen will be provided with a direct access to biometric data of the particular region so that concealing ones identity becomes nearly impossible for anyone. The already existing biometric data storage and identification process has many loop holes. It is predicted that in future this technology will be improved to higher levels ensuring personal privacy intact and precise levels of findings.…

    • 1028 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Various methods of authentication are available using passwords, secret keys, tokens, and bio-metric features are the ones. An authentication system is required be elementary, fast and protected against unlawful use. In this dissertation, we propose multi-factor, multi-channel based authentication system which overcomes most of the drawbacks of existing the authentication system. Moreover, due to the simplicity of the proposed method, it is user friendly while ensures the strong security of…

    • 484 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    One of the advances in fingerprint evidence since Dr. King’s murder has been further study of the ridge comparisons (Saferstein, 2015). A person’s full fingerprint averages 150 ridge characteristics providing plenty of comparison for an identity match (Saferstein, 2015). There have been arguments made that prints collected at a crime scene are not complete, full prints and that could subject the comparison to be invalid because an incomplete fingerprint may only allow for a very limited number of ridge comparison (Saferstein, 2015). In 1973, the International Association of Identification conducted an extensive study, which dispelled any theory that limited ridge comparisons could not identify a person successfully (Saferstein, 2015). In…

    • 395 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays