Preview

Case Project

Good Essays
Open Document
Open Document
650 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Case Project
Case Project 10-2 Standard biometrics can use a person’s unique physical characteristics for authentication; these types of devices can use fingerprints or other physical characteristics of a person’s body. There are two types of fingerprint scanners, a static fingerprint and a dynamic fingerprint scanner. By doing research I found that I cannot recommend using these because of their cost and their reliability.
While researching the cost of standard fingerprint biometric readers I found that most of them are relativity cheap. One can find a halfway decent reader for around a hundred dollars. However, this type of biometric security is not worth saving a few dollars on security expenses and another means should be considered when securing your business.
There is a saying that says you get what you pay for and in this instance I found it to true. Fingerprint biometric devices are unreliable. They have been found give access to unauthorized users and not give access to authorized users. With this flaw fingerprint scanners are not reliable and should not be used as a security method.
Recommending the use of fingerprint scanners is not plausible because they are not a hundred percent accurate. Why even use a standard biometric device at a main entrance to a building. The best method of securing an entrance to a building is the old fashion way. By using manpower to man the entry control points to the building to check personnel to ensure they have access to the building.

Keys form the basic foundation for public key infrastructure and it is important that each key be carefully handled. The proper management of keys includes key storage, key usage, and key-handling procedures. There are different ways to store keys; public keys can be stored by embedding the key within digital certificates, while private keys can be stored on a person’s personal computer. However, there are drawbacks to storing keys using software; software can leave openings for an

You May Also Find These Documents Helpful

  • Satisfactory Essays

    - A fingerprint may be small and unnoticeable to the eye, and even look like many other peoples, but they are in fact very different. Every fingerprint has a different pattern that is unique and unlike anyone else’s. I compared two fingerprints and found that they may look alike from afar, but up close one goes one way, while the other does something else and completely different.…

    • 372 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A fingerprint, in the context of forensics, is an imprint left from the friction ridges of any part of a human hand. Friction ridges are raised portions of the…

    • 1226 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    What makes fingerprints individual? How do scientists match a fingerprint to a specific person? the ridges seen in the fingerprint is what makes it so unique, due to where they begin end and other characteristics. however the fingerprints show in different fingers show the same characteristics within the ridges they are in different locations, and scientist use point by point comparisons to reach a conclusion whether fingerprints are the same.…

    • 580 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Case Study

    • 625 Words
    • 3 Pages

    Accounting today is much more complex and difficult to understand than it has been in the past. Due to the increasing complexity Accounting Information Systems have been created to alleviate some of the pressures facing accountants. According to Frederick Jones and Dasaratha Rama (2006), Enterprise Resource Planning (ERP) systems are moving businesses from the functional approach to an integrated approach for managing transactions (p.684). Having knowledge and experience with the technological advances will help the accountant become more successful. Companies, such as CBU from the case study, must be able to effectively use technology to their advantage if they want to be successful in the future. The accounting staff of CBU must be able to develop more timely and effective system controls for future financial statement purposes and inventory audits.…

    • 625 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The individuality of fingerprints is due to ridge characteristics. They look for point-by-point comparisons in order to determine whether two fingerprints are the same.…

    • 538 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Case Study

    • 1364 Words
    • 6 Pages

    Carl Robins, began working for ABC, Incorporated, about six months ago as a campus recruiter. This is considered a tough job, which involves many responsible. Carl had only been with the company for six months, but expressed he was ready to begin recruiting people. In early April, Carl recruited his first fifteen people. Those people would be working for Monica Carroll who was the Operations Supervisor. Monica informed Carl that she would need them to be done with orientation and working by July, first. Carl planed for all fifteen people to begin orientation on June fifteenth, this would give Carl fifteen days to finish up everything that was not complete. This case study will discuss what Carl Robins was responsible for, it will examine the key problems, and analysis what caused these problems, and provide different possible solutions to the problems.…

    • 1364 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Forensic Science Unit 4

    • 391 Words
    • 2 Pages

    Answer: The individuality of fingerprints is due to ridge characteristics, which are ridge endings, enclosures and other details. Forensic scientists look for point-by-point comparisons in order to determine whether two fingerprints are the same.…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    • Biometrics – Considered the most secure way to authenticate users, biometrics utilizes the biological factors of a user. Examples include retinal eye scan and fingerprints.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Good Essays

    However the American National Standards Institute (ANSI) and National Institute for Science (NIST) standards were routinely required for new systems. The Biometric Standards were what elucidated the limitations of demographic based searches. The substituting of data was crucial for standards and Interoperability. All the standards have limits in images and minutiae M-1 is strictly 1:1, the interoperability is based upon images and all major automatic fingerprint identification system (AFIS) venders have deployed complaints with those standards and the venders have all delivered standards complaint images. The standards are not the complete solution for interoperability, automatic fingerprint identification system (AFIS) technology balances on three main areas. The first one is reliability, which is to find the culprit, the automatic fingerprint identification system (AFIS) requirement for this is 95%. The second one is the selectivity of misidentifying, which was set at as requirement of 1%. Finally, filter or penetration rate, this is how much of the data is search biometrically, automatic fingerprint identification system (AFIS) was 2% of this fingerprint database. With these three criteria’s, a system performance was measured in speed, accuracy, transaction volume and flexibility. The systems performance requirements evolve so the system must adopt to that evolution and the…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The need for using ones signature to sign legal documents is becoming obsolete. The development of thumbprint scanning or even password protection has become even more secure than a signature. Signatures can be easily forged and often times are not even viewed for varification. Thumbprints are unique to every individual and are there for far less likely to be faked.…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Biometric systems are technologies that can scan physiological, chemical or behavioral characteristics of a subject for the sake of verifying or in other words authenticating their identity. It is the latest weapon in the fight against computer crime and identity theft. These technologies work with the help of sampling distinctive biological features, such as tracing patterns of blood vessels in the retina, voice recognition or fingerprinting. Later biological features are extracted and then converted into mathematical codes which are then stored as a biometric template. In order to confirm the identity of the user, they will be required to interact with the system scanner which will process the users identitywith the help of an iris or fingerprint scan. This sample is then compared with the template for a positive match and therefore, access is either granted or denied accordingly.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Fingerprinting Process

    • 758 Words
    • 4 Pages

    As the researcher who lives in North Carolina it was very difficult finding what the fingerprint process is. One would think that every state would require that any teacher seeking employment to teach at a school would need to go through a fingerprinting process to receive clearance to prove that no criminal offenses have been done by that teacher. The State of North Carolina does not require fingerprinting to be done (Teach.com, n.d.). Some counties may require fingerprinting to be done but the entire state does not. Not being able to find this information for North Carolina has led this researcher to look at another state to see what that state’s requirements are.…

    • 758 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Biometric identifications have been associated with very costly top secure applications. Today the cost of such applications is going down due to the evolving technologies. Biometric identification has become a now cost effective, reliable, and highly accurate way to obtain a persons identity.…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    P2: Describe how physical security measures can help keep systems secure Physical security measures are actions, which are only taken by an organisation or a private individual to keep every single piece of software and hardware in an undoubtable safe position. However, these measures are most of the times used to make the best protection as it can be from physical actions. It can be anything from small locks to more technical devices like biometric scanners or CCTV. Bigger number of systems if not every single one is secured with anti-virus software and firewalls but they would absolutely not be helpful if someone would enter the right room and delete or do any other damage to data. Nowadays, there is a lot of different measures available.…

    • 1153 Words
    • 5 Pages
    Good Essays