Preview

Case Project

Good Essays
Open Document
Open Document
650 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Project
Case Project 10-2 Standard biometrics can use a person’s unique physical characteristics for authentication; these types of devices can use fingerprints or other physical characteristics of a person’s body. There are two types of fingerprint scanners, a static fingerprint and a dynamic fingerprint scanner. By doing research I found that I cannot recommend using these because of their cost and their reliability.
While researching the cost of standard fingerprint biometric readers I found that most of them are relativity cheap. One can find a halfway decent reader for around a hundred dollars. However, this type of biometric security is not worth saving a few dollars on security expenses and another means should be considered when securing your business.
There is a saying that says you get what you pay for and in this instance I found it to true. Fingerprint biometric devices are unreliable. They have been found give access to unauthorized users and not give access to authorized users. With this flaw fingerprint scanners are not reliable and should not be used as a security method.
Recommending the use of fingerprint scanners is not plausible because they are not a hundred percent accurate. Why even use a standard biometric device at a main entrance to a building. The best method of securing an entrance to a building is the old fashion way. By using manpower to man the entry control points to the building to check personnel to ensure they have access to the building.

Keys form the basic foundation for public key infrastructure and it is important that each key be carefully handled. The proper management of keys includes key storage, key usage, and key-handling procedures. There are different ways to store keys; public keys can be stored by embedding the key within digital certificates, while private keys can be stored on a person’s personal computer. However, there are drawbacks to storing keys using software; software can leave openings for an

You May Also Find These Documents Helpful

  • Good Essays

    There are only three basic patterns and they are loops, arches, and whorls. Loops cover about 60-65 %, whorls cover about 25-30 % and arches cover 5-10% of all fingerprints. These classifications can be divided even further like plain and tented arches, or radial and ulnar patterns. An example would be that an examiner found a set of fingerprints on a glass. Now they will be able to compare the prints to see if it has the same print pattern as the offender, which is a loop pattern. The loop pattern is a fingerprint class type, along with the arch and…

    • 1049 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    - A fingerprint may be small and unnoticeable to the eye, and even look like many other peoples, but they are in fact very different. Every fingerprint has a different pattern that is unique and unlike anyone else’s. I compared two fingerprints and found that they may look alike from afar, but up close one goes one way, while the other does something else and completely different.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A fingerprint, in the context of forensics, is an imprint left from the friction ridges of any part of a human hand. Friction ridges are raised portions of the…

    • 1226 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    What makes fingerprints individual? How do scientists match a fingerprint to a specific person? the ridges seen in the fingerprint is what makes it so unique, due to where they begin end and other characteristics. however the fingerprints show in different fingers show the same characteristics within the ridges they are in different locations, and scientist use point by point comparisons to reach a conclusion whether fingerprints are the same.…

    • 580 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Case Study

    • 625 Words
    • 3 Pages

    Accounting today is much more complex and difficult to understand than it has been in the past. Due to the increasing complexity Accounting Information Systems have been created to alleviate some of the pressures facing accountants. According to Frederick Jones and Dasaratha Rama (2006), Enterprise Resource Planning (ERP) systems are moving businesses from the functional approach to an integrated approach for managing transactions (p.684). Having knowledge and experience with the technological advances will help the accountant become more successful. Companies, such as CBU from the case study, must be able to effectively use technology to their advantage if they want to be successful in the future. The accounting staff of CBU must be able to develop more timely and effective system controls for future financial statement purposes and inventory audits.…

    • 625 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The individuality of fingerprints is due to ridge characteristics. They look for point-by-point comparisons in order to determine whether two fingerprints are the same.…

    • 538 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensic Science Unit 4

    • 391 Words
    • 2 Pages

    Answer: A device called the Reflected Ultraviolet Imaging System (RUVIS) aims UV light at areas where fingerprints may be.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    • Biometrics – Considered the most secure way to authenticate users, biometrics utilizes the biological factors of a user. Examples include retinal eye scan and fingerprints.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometric systems are technologies that can scan physiological, chemical or behavioral characteristics of a subject for the sake of verifying or in other words authenticating their identity. It is the latest weapon in the fight against computer crime and identity theft. These technologies work with the help of sampling distinctive biological features, such as tracing patterns of blood vessels in the retina, voice recognition or fingerprinting. Later biological features are extracted and then converted into mathematical codes which are then stored as a biometric template. In order to confirm the identity of the user, they will be required to interact with the system scanner which will process the users identitywith the help of an iris or fingerprint scan. This sample is then compared with the template for a positive match and therefore, access is either granted or denied accordingly.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    However the American National Standards Institute (ANSI) and National Institute for Science (NIST) standards were routinely required for new systems. The Biometric Standards were what elucidated the limitations of demographic based searches. The substituting of data was crucial for standards and Interoperability. All the standards have limits in images and minutiae M-1 is strictly 1:1, the interoperability is based upon images and all major automatic fingerprint identification system (AFIS) venders have deployed complaints with those standards and the venders have all delivered standards complaint images. The standards are not the complete solution for interoperability, automatic fingerprint identification system (AFIS) technology balances on three main areas. The first one is reliability, which is to find the culprit, the automatic fingerprint identification system (AFIS) requirement for this is 95%. The second one is the selectivity of misidentifying, which was set at as requirement of 1%. Finally, filter or penetration rate, this is how much of the data is search biometrically, automatic fingerprint identification system (AFIS) was 2% of this fingerprint database. With these three criteria’s, a system performance was measured in speed, accuracy, transaction volume and flexibility. The systems performance requirements evolve so the system must adopt to that evolution and the…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The need for using ones signature to sign legal documents is becoming obsolete. The development of thumbprint scanning or even password protection has become even more secure than a signature. Signatures can be easily forged and often times are not even viewed for varification. Thumbprints are unique to every individual and are there for far less likely to be faked.…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Fingerprinting Process

    • 758 Words
    • 4 Pages

    Fingerprinting is an important process that many employers require in order for a person to obtain a job. Fingerprinting clearance is done to check a person’s background to make sure that he or she has never been convicted of a crime that would prevent him or her from obtaining the job in question. Jobs like teachers and day-care workers need to be fingerprinted to ensure that children who come into contact with these professionals are being taught and taken care of by someone who has not broken the law or been convicted of a crime.…

    • 758 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Biometric identifications have been associated with very costly top secure applications. Today the cost of such applications is going down due to the evolving technologies. Biometric identification has become a now cost effective, reliable, and highly accurate way to obtain a persons identity.…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    P2: Describe how physical security measures can help keep systems secure Physical security measures are actions, which are only taken by an organisation or a private individual to keep every single piece of software and hardware in an undoubtable safe position. However, these measures are most of the times used to make the best protection as it can be from physical actions. It can be anything from small locks to more technical devices like biometric scanners or CCTV. Bigger number of systems if not every single one is secured with anti-virus software and firewalls but they would absolutely not be helpful if someone would enter the right room and delete or do any other damage to data. Nowadays, there is a lot of different measures available.…

    • 1153 Words
    • 5 Pages
    Good Essays