Preview

Biometrics

Good Essays
Open Document
Open Document
774 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometrics
Biometrics and Privacy
CAH
SEC 305 Computer Security
Professor Cox
May 26, 2014

Abstract
With the overwhelming growth of technologies today, it is understandable why there is also such a growing concern of maintaining individual privacy and how it is being invaded by certain forms of biometrics. The intent of biometrics is not necessarily to purposely invade individual privacy and use the information for purposes other than intended, but rather to aid in confirming an individual’s identity, or authenticate that person’s identity. However, there are certainly threats that come with using biometrics by individuals who are interested in obtaining another individuals private and confidential information for their personal use and/or gain. It is important for organizations to ensure that the information collect by their chosen method of biometrics only collects the necessary information on individuals.

Biometrics and Privacy This paper will discuss biometrics and the concerns that individuals have regarding their privacy. People tend to resist biometrics as a method of identification because of their concerns that their privacy will be invaded or belief that the technology is too intrusive on their personal lives. In this paper, some of the current privacy problems related to biometrics will be discussed. A few of the mechanisms that could mitigate these problems and concerns will be identified. In addition, some methods of biometrics that would not meet with undue resistance from potential users will be recommended to my manager to replace password-based access controls. This paper is intended to provide the reader with an overview of biometrics and to also address the associated privacy concerns. There are many concerns by individuals that using biometrics is too intrusive into one’s privacy. Biometrics is used by companies to help authenticate a user’s identity. As stated in Data at Your Fingertips, “Such systems measure and analyze

You May Also Find These Documents Helpful

  • Better Essays

    Kudler Fine Foods

    • 1110 Words
    • 5 Pages

    References: Ex-Sight.Com. (n.d.). What is "Biometrics", and What Kind of Convenience and Security Can it Offer Us. Retrieved March 18, 2012, from Ex-Sight. Com: www.ex-sight.com/biometric.htm…

    • 1110 Words
    • 5 Pages
    Better Essays
  • Good Essays

    IAFIS is the largest biometric database in the world. This system houses on average more than 70 million criminal files of subject along and around 34 million if not more civil prints. This system has more than 73,000 known terrorist that are suspected terrorist crimes against the United States. ("The fbi: Federal,2008”).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Home and occupational users alike are using biometric security. Through a biometric element, such as a fingerprint, devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    • Biometrics – Considered the most secure way to authenticate users, biometrics utilizes the biological factors of a user. Examples include retinal eye scan and fingerprints.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The use of biometric data has created some security concerns. Biometric data is an array of information stemming from minimally non-invasive such as a fingerprint or iris scan to invasive such as a blood sample, taken to collect DNA. This data is not only very personal, but a single biometric can obtain a subjects biographical data, such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States and unique identifying numbers (i.e. driver’s license number). If one were willing to give their data to be used by the government, they want to ensure their information is protected. How can you convince someone that their information is secure and unable to become compromised? The most efficient way to protect biometric data from unauthorized users is encryption.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A. Main Idea: Biometric technology has been traced back to the 14 century in China and through the 19 century developing more uniquely .…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Fingerprinting at Birth

    • 453 Words
    • 2 Pages

    Now-a-days, people are more violent and things happen more frequently than it should. People go missing and turn up dead. Some people are so badly damaged that they cannot be identified by their face or their dental record, which some people don’t have anyways because they have never been to a dentist in their lives. Getting all the kids fingerprinted at birth would help with this so much. If someone turns up badly beaten and they cannot tell who they are by their face, they can run their fingerprints into the data base and pull them up.…

    • 453 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    In exchange to the protection society yearns, civil rights were violated. “Biometrics is an area in which having mechanisms for making decisions that respect human rights is especially important (Johnson, p.92, 2004).” The privacy of a person was taken away once scanned by the machine to collect data. The accuracy of equipment may be questioned. “Ideally, biometric systems would always provide probability of verification of 100% with a false accept rate of 0% (NSTC, 2006).” Criminals who stole an identity of a different person can ruin the reputation the victim. Once the record indicated the criminal act of the person’s name, authorities can monitor the movement of an accused individual. The privacy of the victim violated because of the false verification of biometric system. “ A database with biometric data presents a natural target for theft, malicious, and fraudulent use (Johnson, p. 90, 2004).”…

    • 590 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Greenberg wrote this article to talk about new technology and digital watermarks that help prevent identity theft. Greenberg states, “Reports on the use of biometrics technology and digital watermarks to secure important documents and prevent identity theft. Information on the biometric technology; Features of the digital watermarks; Responsibilities of individuals who are using these technologies.” This article relates to my topic because it explains, what can contribute to decreasing identity theft. This article is valid because it gives many examples on decreasing identity theft.…

    • 626 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Everything is now online, from banking to travel to social media. From the creation of these things, the NSA has also created new possibilities of following you and intruding in your life. For example, The NSA is now allowed to collect images and videos and subject them to facial recognition that is able to put a name to almost any face. There were laws that once prevented the NSA from accessing private company info but large companies have now allowed the government to access this information. The incorporation of better cameras and fingerprinting onto smartphones has also allowed the NSA to put unique biological traits to a person for identification. This is called biometrics. One of the worlds largest know biometric collections belongs to the department of the state. It is believed to have over 75 million photographs of Americans and foreigners with a growing rate of over 35,000 photographs per day. With all these records, the NSA and other agencies are developing ways of storing the data. Such storage is cheap and has wiped out the era of old clunky file cabinets and the use of…

    • 482 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cell Phone Impact

    • 978 Words
    • 4 Pages

    The new technology and apps make things simpler for the consumer but also make personal information less secure and more accessible to identity thieves. This is a concerning and a more common problem that we face wich impacts individuals in a very negative way.…

    • 978 Words
    • 4 Pages
    Good Essays