Dissertation on "Biometric for Security"

Dissertation 5 pages (1493 words) Sources: 3

[EXCERPT] . . . .

Biometric for Security

Biometric security is a fast growing domain of security systems. The use of biometric systems involves the use of automated techniques in the process of identifying an individual on the basis of their biological and behavioral characteristics. Despite the several advantages attached to the use of biometric security systems, recent advancements and knowledge of the security systems coupled with the advancement of technology has resulted in an increase in the number of security ad privacy concerns. The concept of integrating biometrics into security systems has very many applications ranging from domestic, corporate and even military applications. These applications of biometrics are the main reasons why it is crucial that the system is fool proof. The damages that can be associated or rather attributed to a breach of security due to a compromised biometric security system could be worth billions of dollars.

Apart from intrinsic design imperfections, it is very saddening that some cases of biometric security breaches result from negligence of biometric security system producers. This is because of their blatant failure to adhere to the laid down guidelines for security precautions to be incorporated into the design. This paper prescribed ways and means of improving the effectiveness of biometric systems by analyzing the very nature of the vulnerabilities and then prescribing the appropriate measure to counter the security vulnerabilities. The concept of vulnerability is approached by way of conducting a comprehensive vulnerability analysis coupled with an extensive vulnerability assessment of the existing biometric security systems. The proposed system fo
Continue scrolling to

download full paper
r the analysis of the security vulnerabilities are to be undertaken according to the lid down procedures as required by the Assurance Vulnerability Assessment (AVA) class of the ISO/IEC 154008-3 together with Strength of Function (AVA_SOF) analysis (AVA_VLA) which are subclasses.

The paper then prescribes succinctly, the necessary steps needed to patch the breaches that are common in the biometric systems. The solution to the breaches is then delivered by use of an advanced and secure biometric authentication scheme which employs a variety of efficient and robust hashing functions. The functions employed in the authentication process are tailored to protect both the security and privacy of the biometric information.

Problem statement

Previous research has revealed that there are a lot of security and privacy concerns that surround the use of biometric security systems (Abdullayeva, Imamverdiyev, Musayev and Wayman,2009).As illustrated and demonstrated in a couple of scenarios, the several cases of misuse and breach of various biometric system has raised an eye brown in the public domain. The public is very much afraid of the fact that their personal data may land in the wrong hands and also the Big Brother may be watching their every move. In order to reduce the level of anxiety among the public, several initiatives have been devised in order to take care of the privacy concerns. An example is the International Biometric Industry Association's (IBIA) move publish a comprehensive list of all the Privacy principles to be used as the guidelines for biometric system vendors in recognizing the issue of privacy (IBIA, 2003).Several researchers have evaluated the efficiency of various biometric systems by taking into consideration the efficiency of their False Rejection Rate (FRR) and False Acception Rate (FAR).These two parameters are a perfect indicator of the overall efficiency of the general efficiency of the biometric systems. A False Rejection is exhibited whenever an enrolled user is not authorized by the system and is therefore not given the rights of access. False Acception however, is the scenario that unfolds whenever the biometric system grants access to a user whose biometric features are not stored or registered in the security system. Such a scenario can cause serious security breaches and concerns. Most of the data regarding the efficiency of various biometric systems are gathered from the vendors themselves. This makes the data to be non-conclusive since they may manipulate the data to favor their products. As an illustration, in 2001, a series of tests were conducted by the Darmstaedter Fraunhofer-Institut, together with the BSI (German Federal Institute for IT Security) in order to determine the efficiency of various biometric systems. Due to intense pressure from various biometric systems vendors, these results were never published since they represented independent and true findings.

The inefficiency of the biometric systems was further exposed by series of tests that were carried out by Peter-Michael Ziegler, Lisa Thalheim and Jan Krissler in 2002 (C'T, 2002).They employed three different approaches to breach the biometric security systems.… READ MORE

Quoted Instructions for "Biometric for Security" Assignment:

1. Based upon the assigned reading, and your initial thinking on potential research topics, develop a 3-5 page paper summarizing your current thinking on one or more research areas of interest and potential research topics. Your paper should include the main idea and be supported with current (within the past 5 years) research. For example, cite the key references from which you anticipate your final research topic will most likely evolve. In addition, please make sure to justify your research topic clearly relative to whether you are seeking a research degree a doctoral professional degree (DBA).

2. Select your topic and create a problem statement. Present this problem statement in approximately a 1-4 page paper that includes an introduction to your topic and the research problem statement, which includes appropriate documentation. When written appropriately, your problem statement should explain and justify your envisioned research.

3. After your Mentor approves your chosen research problem statement, begin the development of an annotated bibliography containing the references which you located that are related to your approved research topic and problem. *****

How to Reference "Biometric for Security" Dissertation in a Bibliography

Biometric for Security.” A1-TermPaper.com, 2010, https://www.a1-termpaper.com/topics/essay/biometric-security/1578939. Accessed 6 Jul 2024.

Biometric for Security (2010). Retrieved from https://www.a1-termpaper.com/topics/essay/biometric-security/1578939
A1-TermPaper.com. (2010). Biometric for Security. [online] Available at: https://www.a1-termpaper.com/topics/essay/biometric-security/1578939 [Accessed 6 Jul, 2024].
”Biometric for Security” 2010. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/biometric-security/1578939.
”Biometric for Security” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/biometric-security/1578939.
[1] ”Biometric for Security”, A1-TermPaper.com, 2010. [Online]. Available: https://www.a1-termpaper.com/topics/essay/biometric-security/1578939. [Accessed: 6-Jul-2024].
1. Biometric for Security [Internet]. A1-TermPaper.com. 2010 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/biometric-security/1578939
1. Biometric for Security. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/biometric-security/1578939. Published 2010. Accessed July 6, 2024.

Related Dissertations:

Security Plan Case Study

Paper Icon

Security Plan

The Maryland public safety education and training center deals with firearms training, public safety and education, and drug abuse resistance. The center is located on a 700 acre… read more

Case Study 9 pages (2681 words) Sources: 6 Topic: Computers / IT / Internet


Future of Security Term Paper

Paper Icon

Future of Security

In previous decades, security within nations and across enterprises was managed as an ancillary process. The lessons learned over the last two decades have elevated security management… read more

Term Paper 4 pages (1106 words) Sources: 3 Topic: Military / Army / Navy / Marines


Biometric Security Term Paper

Paper Icon

Biometric Security in Both The Public Agency and Private Firm

Biometric Security carries highly technological implications. And to an extent, these implications are valid as expanding capabilities in computing and… read more

Term Paper 4 pages (1181 words) Sources: 5 Topic: Computers / IT / Internet


Biometric Information Systems and Privacy Rights Essay

Paper Icon

Biometric Information Systems and Privacy Rights

Biometric information systems are systems that cover a wide range of technologies for technologies that can be used to verify the identity of individuals… read more

Essay 4 pages (1381 words) Sources: 8 Topic: Computers / IT / Internet


Biometric Technology and Security Pros and Cons Research Proposal

Paper Icon

Computer Technology - Biometrics

BIOMETRIC TECHNOLOGY: SECURITY PROS and CONS

Biometric authentication has developed substantially as an emerging field of computer-based security since its introduction shortly before the end of… read more

Research Proposal 2 pages (587 words) Sources: 5 Topic: Computers / IT / Internet


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!