Preview

Presentation Powerpoint

Satisfactory Essays
Open Document
Open Document
415 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Presentation Powerpoint
a t a
D
c i r t e m o
Bi

ore m l e v tra g n i k a
M

t! n e i n e conv

Elizabeth Foss
Tracy Chisolm

Team Member Bios and Roles
Elizabeth Foss
ITT Tech Information Systems Security 2nd
Quarter
-Research, Questions, Solutions

Tracy Chisolm
ITT Tech Information Systems Security 2nd
Quarter
-Research, Issues, Solutions

Background and Context
Biometrics refers to the automatic identification or identity verification of living persons using their enduring physical or behavioral characteristics.
A single biometric, taken from a subjects fingerprint or iris scan can obtain information such as name, address, social security number, telephone number, e-mail address, booking and/or border crossing photos, gender, race, date of birth, immigration status, length of time in the United States, and unique identifying numbers (drivers license number) Background and Context
A study of people’s attitudes to the use of biometric identification for travel has revealed that 89% of citizens are willing to provide details such as fingerprints. So it seems the sacrifice of a little privacy and anonymity is worth a bit more convenience.

What’s the problem?
How will the data be protected and/or used?

Possible Solutions
Detailed and understandable security plan must be implemented Define uses and ensure public knowledge
Information should not be easily transferable
Information should be encrypted
Access control
Key management
Database cross-matching should reveal little information

Optimal Solution
Encryption
The encryption system translates a fingerprint or iris image file into code using a mathematical tool called a hash function—an algorithm that generates a small but unique set of numbers from a larger data file. Benefits of the
Encryption
Encryption of biometric data will ease the minds of the public
Encryption adds an additional measure of security to the system making it impossible for certain viruses and malware to penetrate it. It also makes one’s personal data



Bibliography: Danielyan, E. (2004). The Lures of Biometrics. The Internet Protocol Journal, 7(1). Retrieved July 10, 2014, from http://www.cisco.com/web/about/ac123 Flanders, Karl. (2014). Most people keen to share biometric data for smoother travel. Computer Weekly. Retrieved July 10, 2014, from http://www.computerweekly.com/news/2240223713/Most-people-keen-to-sharebiometric-data-for-smoother-travel Kephart, Janice. (2013). Biometric Exit Tracking. The Center for Immigration Studies. Retrieved July 10, 2014, from http://cis.org/biometric-exit-trackingfeasable-and-cost-effective Stringent new immigration rules to get R5m fast track. (n.d.). News24. Retrieved July 31, 2014, from http://www.news24.com/Travel/SouthAfrica/Immigration-rules-will-not-change-Gigaba-20140731

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Follow the steps for the type of project you have chosen. EVERY slide needs a title,…

    • 250 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Based on the article by Fontana (2008), Microsoft has introduced a new prototype for PowerPoint called pptPlex. The motivation behind implementing this plug-in which Microsoft calls a “canvas”, is to allow users to put together various elements in a single place, then highlight sections using a zoom feature. Microsoft wants their users to be able to organize their digital belongings in much the same way that they organize their physical belongings. The pptPlex format changes the typical way PowerPoint presentations are built, a series of slides presented one after another. With the new prototype it allows for a more free moving presentation.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Biometric systems are technologies that can scan physiological, chemical or behavioral characteristics of a subject for the sake of verifying or in other words authenticating their identity. It is the latest weapon in the fight against computer crime and identity theft. These technologies work with the help of sampling distinctive biological features, such as tracing patterns of blood vessels in the retina, voice recognition or fingerprinting. Later biological features are extracted and then converted into mathematical codes which are then stored as a biometric template. In order to confirm the identity of the user, they will be required to interact with the system scanner which will process the users identitywith the help of an iris or fingerprint scan. This sample is then compared with the template for a positive match and therefore, access is either granted or denied accordingly.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Murali, Biometrics; She Unlimited Network, vBulletin v3.0.7, Copyright 2000-2006, Jelsoft Enterprises Ltd. http://www.sheunlimited.com/forums/archive/index.php/t-1611.html retrieved 07/15/06…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Inquiry Paper Powerpoint

    • 689 Words
    • 3 Pages

    An inquiry paper, what in the world is that? That was the exact thought that went through my mind when my teacher introduced the type of paper I had to do. An inquiry paper sounded like a business plan where I had to make a PowerPoint into a ten-page essay. I remember clearly thinking that ten pages of insanity will most definitely kill me, or at least leave me half dead. Maybe I will even develop a phobia of writing. It is even worst that research comes with it too. I had no idea what my central research question was going to be, then I had a sudden nasty flashback of the times where the days I just have no motivation, felt lazy, and just burrito myself in blankets while watching sappy romance movies. I knew I wanted my paper to center around…

    • 689 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become possible thanks to the advancements in pattern recognition technology.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    Biometric data is being used to identify an individual nowadays because identity theft is a common fear, but this data could also be collected…

    • 1144 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    YG ENTERTAINMENT By: Samantha Li WHAT DOES YG ENTERTAINMENT DO?…

    • 330 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    This is the first chapter of the novel and it holds the very fundamentals for the upcoming story. The significance of this chapter is the fact that we are introduced to the main protagonist of the novel, Holden, who clearly seems to be dealing with a lot of psychological stress. Without this chapter, we would not be able to dig into Holden’s background and learn about his drop out at Pencey Prep, him losing all the equipment’s for the fencing team or the fact that his relationship with his brother is not so good.…

    • 464 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Powerpoint Content

    • 374 Words
    • 2 Pages

    Content: Relevant, informative, and accurate information. Focused and consistent with topic. Shows understanding and comprehension of task requirements. Many illustrations. Somewhat relevant, or some inaccuracies, somewhat focused. Consistent with topic, but did not understand or ignored some task requirements. Some illustrations. Many inaccuracies, lack of focus, or inconsistent with topic and task requirements. May be unnecessarily repetitive. Few or no illustrations. 30 Quantity: Quantity of content and material presented consistent with task requirements. Quantity of content somewhat incomplete or somewhat exceeds requirements. Quantity of content is significantly incomplete or greatly exceeds requirements. 20 Style: Material presented with unique and interesting style and personality. Inspires curiosity about topic, while being appropriate for topic and audience. Readable font and color scheme. Material shows some attention paid to style, although a bit misdirected or inappropriate for topic or audience. Readable font and color scheme. Material shows little attention to style. Inspires little curiosity about topic, or is distracting. Font and/or color scheme may make reading difficult. 20 Organization: Topic breakdown follows logical pattern and flow. Easy to follow. Includes proper headings or outlines. Introductions and conclusions where appropriate. Topic somewhat disorganized, presentation of material understandable, somewhat difficult to follow. Incomplete slide headings. Topic not properly organized, presentation of material does not flow, or is very difficult to follow. Few, if any headings. 15 Writing Conventions: Follows rules of grammar, spelling, punctuation, and capitalization. Very few or no conventional writing errors.…

    • 374 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Finished Powerpoint

    • 2708 Words
    • 10 Pages

    The disadvantages of promotional offer :The disadvantage of promotional offer could be the failure for example Tesco spent and invested a…

    • 2708 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Final Powerpoint

    • 436 Words
    • 7 Pages

    BUDDHISM Nancy Ellison Katrina Gilliard Kastina Cole Rel/133 February 3, 2014 Rev Lewis E. Hoye INTRODUCTION Buddhism is one of the world’s oldest and most significant religions. It has spread through almost all of Asia, it had its beginnings in India and arose from one person.…

    • 436 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data protection It is agreed no data is to be passed on to anyone without clients or next of kin consent and data about the clients or employees is not to be passed on or leave the premises, without permission of the home manager…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    AADHAR AS IN MIS

    • 1038 Words
    • 5 Pages

    No country has undertaken to build a national registry at the scale and accuracy as UIDAI initiative. Nature and diversity of India's working population adds another challenge to achieving uniqueness through biometrics features. Like other technology fields such as telecommunication, we do not have experience like developed countries to leverage for designing UIDAI's biometric systems. For example, the largest existing biometrics database in the world is one order smaller in magnitude than India's needs.…

    • 1038 Words
    • 5 Pages
    Better Essays
  • Good Essays

    OB Presentation Slide

    • 1125 Words
    • 11 Pages

    ORGANIZATION AL BEHAVIOR Student Group Presentation Questions of the Case: 1. 2. 3. Describe and evaluate the team situation and the process that are going on in Julie Mok’s current project team. Identity and discuss the sources and the tactics of power that Harry uses in this case and explain other sources and tactics of power that could be prevalent in an organization.…

    • 1125 Words
    • 11 Pages
    Good Essays

Related Topics