Preview

09 Project Conclusion

Satisfactory Essays
Open Document
Open Document
285 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
09 Project Conclusion
Elizabeth Foss
EG 372
09 Project Conclusion
Individual write up

The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption. The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.

You May Also Find These Documents Helpful

  • Good Essays

    Project 01

    • 6251 Words
    • 50 Pages

    #!/usr /bin/env python ''' Simple example of stereo image matching and point cloud generation. #!/usr /bin/env python '''…

    • 6251 Words
    • 50 Pages
    Good Essays
  • Satisfactory Essays

    Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The object of this course and this project is to provide you with a realistic situation that you are likely to face in the real world business environment. You'll be working with limited information, limited support from your client, within a limited time frame - and yet, you have to get up to speed in a new area quickly, and make informed professional recommendations based on your research and analysis.…

    • 1715 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Home and occupational users alike are using biometric security. Through a biometric element, such as a fingerprint, devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Fingerprinting at Birth

    • 453 Words
    • 2 Pages

    Now-a-days, people are more violent and things happen more frequently than it should. People go missing and turn up dead. Some people are so badly damaged that they cannot be identified by their face or their dental record, which some people don’t have anyways because they have never been to a dentist in their lives. Getting all the kids fingerprinted at birth would help with this so much. If someone turns up badly beaten and they cannot tell who they are by their face, they can run their fingerprints into the data base and pull them up.…

    • 453 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The Future Of Criminology

    • 2252 Words
    • 6 Pages

    Hirschfeld Davis, J. (2015). Obama Calls for New Laws to Bolster Cybersecurity. Retrieved from http://www.nytimes.com/2015/01/14/us/obama-to-announce-new-cyberattack-protections.html?_r=0…

    • 2252 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Fingerprint analysis had been used for over 100 years in law enforcement. The first forensic organization to identify criminals was established in 1915. In that time fingerprints were being used to track a criminal’s record, including previous arrests to decide decisions like sentencing, probation, and pardoning decisions. As technology has advanced so has our use for fingerprints. We have now been able to use fingerprints for background checks, biometric security (a way to access computers, electronic devices, and or secure locks or doors by using a fingerprint), and mass disaster identification. For example, in the case of a mass disaster to identify a large amount of people instead of the usual way of another person identifying the body you would take the fingerprints of the victims. Then they would take the fingerprints through the data base to identify each individual. The fingerprint data base is the largest data base in the world.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Biometrics is a science. It is a science that measures individuals¡¦ physical characteristic properties that are unique. With world changing of every second of everyday; human beings is still the cause of security breaching. On just about every website you need a password or pin number. Passwords and ID cards have been used to control access to restricted systems. However, security can be easily breached in these systems when a password is disclosed to an unauthorized user or a card is stolen by an impostor. We as humans forget password and pin numbers because we have so much to protect and access. Furthermore, simple passwords are easy to guess and difficult passwords may be hard to remember. The coming out of biometrics has addressed the problems that occur in traditional verification methods. Biometrics in this case would be best. With biometrics it¡¦s uniqueness of physical characteristics can never be lost, stolen, shared or forgotten.…

    • 2060 Words
    • 9 Pages
    Best Essays
  • Better Essays

    Biometrics, coupled with passwords and tokens can significantly increase network security, however, biometrics alone at their current capabilities are more susceptible to security breaches than passwords alone.…

    • 1656 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Aliahmed

    • 660 Words
    • 3 Pages

    identification and the verification of identity claims. It brings together the promise of other biometric systems, which…

    • 660 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Biometric System

    • 5133 Words
    • 21 Pages

    A brief background of biometric and biometric security systems will provide a greater understanding of the concept of network security. Biometrics is defined as the unique (personal) physical/logical characteristics or traits of human body [Jain, 2004]. These characteristics and traits are used to identify each human. Any details of the human body which differs from one human to other will be used as unique biometric data to serve as that person 's unique identification (ID), such as: retinal, iris, fingerprint, palm print and DNA. Biometric systems will collect and store this data in order to use it for verifying personal identity. The combination of biometric data systems and biometrics recognition/ identification technologies creates the biometric security systems. The biometric security system is a lock and capture mechanism to control access to specific data. In order to access the biometric security system, an individual will need to provide their unique characteristics or traits which will be matched to a database in the system. If there is a match, the locking system will provide access to the data for the user. The locking and capturing system will activate and record information of users who accessed the data. The relationship between the biometric and biometric security system is also known as the lock and key system. The biometrics security system is the lock and biometrics is the key to open that lock [Jain, 2006].…

    • 5133 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Multimodal Biometrics

    • 2488 Words
    • 10 Pages

    “Biometrics” means “life measurement”, but the term is usually associated with the use of unique physiological characteristics to identify an individual. One of the applications which most people associate with biometrics is security. It is an automated method of recognizing a person based on the features face, fingerprints, hand geometry, handwriting, iris, retinal, vein, voice etc. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secureidentification and personal verification technologies is becoming apparent.…

    • 2488 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Related Studies

    • 530 Words
    • 3 Pages

    refers to technologies used to detect and recognize human physical characteristics. In the ITworld, biometrics is often synonymous with "biometric authentication," a type of security authorization based on biometric input.…

    • 530 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Advantages Of Biometric

    • 348 Words
    • 2 Pages

    Unlike passwords the biometric data cant be retracted – means- if someone knows your password, you can change them. If someone hacks your finger print, you cant change your finger.…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Many institutions and companies are using advanced technologies for their business and reliability of data. Security and data confidentiality is also there. They are using such Biometrics to prevent errors and handling complex situations.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays