D
c i r t e m o
Bi
ore m l e v tra g n i k a
M
t! n e i n e conv
Elizabeth Foss
Tracy Chisolm
Team Member Bios and Roles
Elizabeth Foss
ITT Tech Information Systems Security 2nd
Quarter
-Research, Questions, Solutions
Tracy Chisolm
ITT Tech Information Systems Security 2nd
Quarter
-Research, Issues, Solutions
Background and Context
Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioral characteristics.
A single biometric, taken from a subjects fingerprint or iris scan can obtain information such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States, and unique identifying numbers (drivers license number) Background and Context
A study of people’s attitudes to the use of biometric identification for travel has revealed that 89% of citizens are willing to provide details such as fingerprints. So it seems the sacrifice of a little privacy and anonymity is worth a bit more convenience.
What’s the problem?
How will the data be protected and/or used?
Possible Solutions
Detailed and understandable security plan must be implemented Define uses and ensure public knowledge
Information should not be easily transferable
Information should be encrypted
Access control
Key management
Database cross-matching should reveal little information
Optimal Solution
Encryption
The encryption system translates a fingerprint or iris image file into code using a mathematical tool called a hash function—an algorithm that generates a small but unique set of numbers from a larger data file. Benefits of the
Encryption
Encryption of biometric data will ease the minds of the public
Encryption adds an additional measure of security to the system making it impossible for certain viruses and malware to penetrate it. It also makes one’s personal data
Bibliography: Danielyan, E. (2004). The Lures of Biometrics. The Internet Protocol Journal, 7(1). Retrieved July 10, 2014, from http://www.cisco.com/web/about/ac123 Flanders, Karl. (2014). Most people keen to share biometric data for smoother travel. Computer Weekly. Retrieved July 10, 2014, from http://www.computerweekly.com/news/2240223713/Most-people-keen-to-sharebiometric-data-for-smoother-travel Kephart, Janice. (2013). Biometric Exit Tracking. The Center for Immigration Studies. Retrieved July 10, 2014, from http://cis.org/biometric-exit-trackingfeasable-and-cost-effective Stringent new immigration rules to get R5m fast track. (n.d.). News24. Retrieved July 31, 2014, from http://www.news24.com/Travel/SouthAfrica/Immigration-rules-will-not-change-Gigaba-20140731