Preview

Presentation Powerpoint

Satisfactory Essays
Open Document
Open Document
415 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Presentation Powerpoint
a t a
D
c i r t e m o
Bi

ore m l e v tra g n i k a
M

t! n e i n e conv

Elizabeth Foss
Tracy Chisolm

Team Member Bios and Roles
Elizabeth Foss
ITT Tech Information Systems Security 2nd
Quarter
-Research, Questions, Solutions

Tracy Chisolm
ITT Tech Information Systems Security 2nd
Quarter
-Research, Issues, Solutions

Background and Context
Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioral characteristics.
A single biometric, taken from a subjects fingerprint or iris scan can obtain information such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States, and unique identifying numbers (drivers license number) Background and Context
A study of people’s attitudes to the use of biometric identification for travel has revealed that 89% of citizens are willing to provide details such as fingerprints. So it seems the sacrifice of a little privacy and anonymity is worth a bit more convenience.

What’s the problem?
How will the data be protected and/or used?

Possible Solutions
Detailed and understandable security plan must be implemented Define uses and ensure public knowledge
Information should not be easily transferable
Information should be encrypted
Access control
Key management
Database cross-matching should reveal little information

Optimal Solution
Encryption
The encryption system translates a fingerprint or iris image file into code using a mathematical tool called a hash function—an algorithm that generates a small but unique set of numbers from a larger data file. Benefits of the
Encryption
Encryption of biometric data will ease the minds of the public
Encryption adds an additional measure of security to the system making it impossible for certain viruses and malware to penetrate it. It also makes one’s personal data



Bibliography: Danielyan, E. (2004). The Lures of Biometrics. The Internet Protocol Journal, 7(1). Retrieved July 10, 2014, from http://www.cisco.com/web/about/ac123 Flanders, Karl. (2014). Most people keen to share biometric data for smoother travel. Computer Weekly. Retrieved July 10, 2014, from http://www.computerweekly.com/news/2240223713/Most-people-keen-to-sharebiometric-data-for-smoother-travel Kephart, Janice. (2013). Biometric Exit Tracking. The Center for Immigration Studies. Retrieved July 10, 2014, from http://cis.org/biometric-exit-trackingfeasable-and-cost-effective Stringent new immigration rules to get R5m fast track. (n.d.). News24. Retrieved July 31, 2014, from http://www.news24.com/Travel/SouthAfrica/Immigration-rules-will-not-change-Gigaba-20140731

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    Page 5 Additional Information  Client preferences • How client conducts business  Data expectations • Format and delivery mechanism  Process expectations • “How things should work” IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved.…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Follow the steps for the type of project you have chosen. EVERY slide needs a title,…

    • 250 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Based on the article by Fontana (2008), Microsoft has introduced a new prototype for PowerPoint called pptPlex. The motivation behind implementing this plug-in which Microsoft calls a “canvas”, is to allow users to put together various elements in a single place, then highlight sections using a zoom feature. Microsoft wants their users to be able to organize their digital belongings in much the same way that they organize their physical belongings. The pptPlex format changes the typical way PowerPoint presentations are built, a series of slides presented one after another. With the new prototype it allows for a more free moving presentation.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Home and occupational users alike are using biometric security. Through a biometric element, such as a fingerprint, devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Ap Powerpoint Presentation

    • 1490 Words
    • 6 Pages

    1. I want to start with a picture of a doughnut. The reason why is because when we see it you begin to salivate because you might want to eat a doughnut. But it also has a hole in it, and if you were to stick your finger through the hole in a doughnut, that a lot like food moving through the hole that is your digestive system. In other words its going to move all the way from your mouth out your anus. But its not realy inside of you. When you stick your finger through the hole of a doughnut it not technically insdie the doughnut. Just like the food that goes through your digestive system is not technically inside your body, its just moving through a hole in your body. We can eventually absorb that material inside our body, but not until it gets very small.…

    • 1490 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Technology affects our life daily, and it also affects the criminal justice system, especially in communication. The criminal justice system has different databases do to technology, and these databases operate faster than it would take humans could do. So, the biometrics technologies can measure and analyze the human body characteristics such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. (Rouse, 2015) The Biometrics is another word for the specialized database it has been around for hundreds of years and provided through the new technology over the years. The Biometric history back dates to 1858 when the first systematic capture of hand images for identification purpose was record. In 1992, the United States established the Biometric Consortium and in 2003 the formal U.S. Government coordination of Biometric activities began. Then in 2005 the Iris on the Move was announced at the Biometric Consortium Conference. Throughout the years many different changes and developments occurred.…

    • 1728 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Inquiry Paper Powerpoint

    • 689 Words
    • 3 Pages

    An inquiry paper, what in the world is that? That was the exact thought that went through my mind when my teacher introduced the type of paper I had to do. An inquiry paper sounded like a business plan where I had to make a PowerPoint into a ten-page essay. I remember clearly thinking that ten pages of insanity will most definitely kill me, or at least leave me half dead. Maybe I will even develop a phobia of writing. It is even worst that research comes with it too. I had no idea what my central research question was going to be, then I had a sudden nasty flashback of the times where the days I just have no motivation, felt lazy, and just burrito myself in blankets while watching sappy romance movies. I knew I wanted my paper to center around…

    • 689 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Final Powerpoint

    • 436 Words
    • 7 Pages

    BUDDHISM Nancy Ellison Katrina Gilliard Kastina Cole Rel/133 February 3, 2014 Rev Lewis E. Hoye INTRODUCTION Buddhism is one of the world’s oldest and most significant religions. It has spread through almost all of Asia, it had its beginnings in India and arose from one person.…

    • 436 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data protection It is agreed no data is to be passed on to anyone without clients or next of kin consent and data about the clients or employees is not to be passed on or leave the premises, without permission of the home manager…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Finished Powerpoint

    • 2708 Words
    • 10 Pages

    The disadvantages of promotional offer :The disadvantage of promotional offer could be the failure for example Tesco spent and invested a…

    • 2708 Words
    • 10 Pages
    Good Essays
  • Good Essays

    OB Presentation Slide

    • 1125 Words
    • 11 Pages

    ORGANIZATION AL BEHAVIOR Student Group Presentation Questions of the Case: 1. 2. 3. Describe and evaluate the team situation and the process that are going on in Julie Mok’s current project team. Identity and discuss the sources and the tactics of power that Harry uses in this case and explain other sources and tactics of power that could be prevalent in an organization.…

    • 1125 Words
    • 11 Pages
    Good Essays
  • Good Essays

    This is the first chapter of the novel and it holds the very fundamentals for the upcoming story. The significance of this chapter is the fact that we are introduced to the main protagonist of the novel, Holden, who clearly seems to be dealing with a lot of psychological stress. Without this chapter, we would not be able to dig into Holden’s background and learn about his drop out at Pencey Prep, him losing all the equipment’s for the fencing team or the fact that his relationship with his brother is not so good.…

    • 464 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    YG ENTERTAINMENT By: Samantha Li WHAT DOES YG ENTERTAINMENT DO?…

    • 330 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Powerpoint Content

    • 374 Words
    • 2 Pages

    Content: Relevant, informative, and accurate information. Focused and consistent with topic. Shows understanding and comprehension of task requirements. Many illustrations. Somewhat relevant, or some inaccuracies, somewhat focused. Consistent with topic, but did not understand or ignored some task requirements. Some illustrations. Many inaccuracies, lack of focus, or inconsistent with topic and task requirements. May be unnecessarily repetitive. Few or no illustrations. 30 Quantity: Quantity of content and material presented consistent with task requirements. Quantity of content somewhat incomplete or somewhat exceeds requirements. Quantity of content is significantly incomplete or greatly exceeds requirements. 20 Style: Material presented with unique and interesting style and personality. Inspires curiosity about topic, while being appropriate for topic and audience. Readable font and color scheme. Material shows some attention paid to style, although a bit misdirected or inappropriate for topic or audience. Readable font and color scheme. Material shows little attention to style. Inspires little curiosity about topic, or is distracting. Font and/or color scheme may make reading difficult. 20 Organization: Topic breakdown follows logical pattern and flow. Easy to follow. Includes proper headings or outlines. Introductions and conclusions where appropriate. Topic somewhat disorganized, presentation of material understandable, somewhat difficult to follow. Incomplete slide headings. Topic not properly organized, presentation of material does not flow, or is very difficult to follow. Few, if any headings. 15 Writing Conventions: Follows rules of grammar, spelling, punctuation, and capitalization. Very few or no conventional writing errors.…

    • 374 Words
    • 2 Pages
    Good Essays
  • Better Essays

    AADHAR AS IN MIS

    • 1038 Words
    • 5 Pages

    No country has undertaken to build a national registry at the scale and accuracy as UIDAI initiative. Nature and diversity of India's working population adds another challenge to achieving uniqueness through biometrics features. Like other technology fields such as telecommunication, we do not have experience like developed countries to leverage for designing UIDAI's biometric systems. For example, the largest existing biometrics database in the world is one order smaller in magnitude than India's needs.…

    • 1038 Words
    • 5 Pages
    Better Essays

Related Topics