We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySharon Cunningham
Modified about 1 year ago
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people. Copyright © 2008 by Helene G. Kershner
Biometrics Biometrics is the study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits biometric authentication refers to technologies for measuring and analyzing human physical and behavioral characteristics for authentication purposes.authentication Copyright © 2008 by Helene G. Kershner
Biometrics “The European Union has given the green light to biometric passports.” –Children’s passports” will not feature biometric identification” because their fingerprints are still developing. –Civil liberty and security researchers are objecting believing that “that storing so many biometric records in a central European database is a security risk.” Copyright © 2009 by Helene G. Kershner
Biometrics Physiological characteristics – face – fingerprint – DNA Behavioral characteristics – signature – voiceprint – gait –http://cubs.buffalo.edu/about_biometrics.shtml Copyright © 2008 by Helene G. Kershner
Biometrics Issues and Concerns Technology has the potential to do great things. It also brings with it the potential to do harm. Are concerns surrounding biometric use real or imagined? Do our concerns prevent us from seeing the vast potential of the new technologies developed using biometrics Copyright © 2008 by Helene G. Kershner
Biometrics Issues and Concerns: This could happen - DNA is planted at the scene of the crime Assume another's identity by using the person’s biometrics or simulating their biometrics. In this way, impersonate them without arousing suspicion Fool a fingerprint detector by using a piece of sticky tape with an authentic fingerprint on it Fool an iris recognition camera by showing a photo of another’s iris Hack into the interface between a biometric device and the host system, so that a "fail" message gets converted to a "pass". Copyright © 2008 by Helene G. Kershner
Biometrics Issues and Concerns Biometric measurements are more difficult to forge Since biometrics more problematic when lost or stolen Copyright © 2008 by Helene G. Kershner
Biometrics Identity theft Biometrics can confuse the solution Credit card theft is a significant problem for the individual involved. BUT, If a person’s fingerprints are stolen, the damage could be irreversible. Are biometric technologies being used without adequate safeguards? Copyright © 2008 by Helene G. Kershner
Biometrics Privacy Biometrics are often are touted as a way to reduce crime. –Yet, privacy advocates fear biometrics may be used to decrease personal liberties of law abiding citizens. Developments in digital video, infrared, x-ray, wireless, global positioning satellite systems, image scanning, voice recognition, DNA, and brain wave fingerprinting provide government with new ways to "search" individuals –Now organizations collect vast databases of information on law-abiding members of the public. Copyright © 2008 by Helene G. Kershner
Biometrics Who is watching the watchers? The 4 th Amendment guarantees free speech and a right to privacy. Do biometrics strip away these rights? If everyone is biometrically “searched” at a concert or sporting event and compared with a database of known terrorists we “may” be safer, but have we lost something in exchange? Copyright © 2008 by Helene G. Kershner
Biometrics Sociological concerns As technology advances, more and more private companies and public utilities will use biometrics for safe, accurate identification. Is this the direction we want technology to go? Are there physical dangers: –Are retinal scans safe? –How accurate are the devices in question? –If DNA is found at the site of an investigation, who knows when I was there? Copyright © 2008 by Helene G. Kershner
Biometrics & Forensics “Forensic Science –The application of the natural and physical sciences to questions of legal or public concern. –The most common application is the analysis of evidence, such as blood, hairs, fibers, bullets, and fingerprints, from criminal cases like bank robberies, homicides, and kidnappings.” –Applied after a situation has occurred Copyright © 2009 by Helene G. Kershner
Biometrics & Forensics Biometrics is used before an event has occurred. –“gaining access, surveillance, or verification – biometrics chooses which mode of identification will be used” Copyright © 2009 by Helene G. Kershner
Biometrics & Forensics Toolkit is often the same –Fingerprint analysis –Biometric identification –Video analysis –“Impression” analysis –Document analysis –Database comparison Copyright © 2009 by Helene G. Kershner
Biometrics & Forensics Using biometrics for digital identification –http://www.helium.com/items/ fingerprint-vs- biometricshttp://www.helium.com/items/ fingerprint-vs- biometrics Copyright © 2009 by Helene G. Kershner
Introduction to Computer Forensics Reference: Chapter 13, Computer Network Security, Springer, Joseph M. Kizza.
Learning Objectives 13.1 Explain how businesses benefit from the use of information technology (IT) Describe the components that enable IT– networks,
Feb 5, 2011 My name is Kaye Beach. I am a member of the Board of Directors of the Constitutional Alliance and have been working with Mark Lerner for the.
Security Controls and Systems in E-Commerce Prof. Mohamed Aly Aboul - Dahab Head of Electronic and communications Engineering Department Arab Academy for.
Preventing Its More Than Just Your Wallet…. Identity Theft One New Identity Theft Victim Every 3 Seconds in 2012 (Javelin Strategy & Researchs 2012 Identity.
Computers Are Your Future Chapter 9: Privacy, Crime, and Security 1.
Advantages Some can also define, translate, and hear printed text, and can also store and beam text to computers and other devices. Quick & accurate for.
Information Technology INT1001 Lecture 12 Privacy, Crime & Security 1.
Chapter 3: Physical Evidence Any tangible objects that can be collected from a crime scene.
Copyright, Biometric Insecurity Roger Clarke Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Baker & McKenzie Cyberspace Law & Policy.
312 Test Review 1 Ethics, Privacy, and Freedom of Speech.
1 AN ATM WITH AN EYE THE FUTURE,S TECHNOLOGY AN ATM WITH AN EYE THE FUTURE,S TECHNOLOGY
The. of and a to in is you that it he for.
1 Science as a Process Chapter 1 Section 2. 2 Objectives Explain how science is different from other forms of human endeavor. Identify the steps that.
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Information Technology Engineering 124 Spring 2005.
Topic 2 - Applications of AI St Kentigerns Academy Unit 2 – Artificial Intelligence.
Hannah King and Makayla Black. Our goal is to better our clients way of security and help them keep a safe environment for their clients as well.
Root Cause Analysis Training BC Timber Sales. Agenda EMS Incidents Investigations Root Cause analysis Implement Corrective/Preventative Measures Evaluation.
Company LOGO Data Protection Fundamentals Sensitisation MQA By : Mrs. Pravina DODAH Mr. Hemrajsingh BHUGOWON Date : 09 Nov 2012.
1 CS5038 The Electronic Society Security 1: Security and Crime Online Well begin with a look at whats out there. In Security 2, well think about it all.
GPHS. Netsmartz.org National Center for Missing & Exploited Children Commonsensemedia.org Galena Park ISD Internet Safety Moodle Page.
COMPUTER NETWORKS. COMMUNICATION BETWEEN COMPUTERS For a computer to communicate with each other (which may be a completely different system) an interface.
Chapter 12 Technology. INTRODUCTION This chapter considers technology in general, with some limited emphasis on software. The life cycle and software.
1 Kaspersky CCleaner VerbAce WinRar. 2 About VerbAce 2008 Freeware VerbAce 2008 freeware is a translation software with a Arabic-English-Arabic dictionary.
Of. and a to the in is you that it at be.
Copyright © 2003 Pearson Education, Inc. Slide 11-1.
LIS510 lecture 8 Thomas Krichel introduction Reading –Rubin chapter 2. –Rubin chapter 4 until page 153 –Library of Congress "Copyright Basics",
Compared on-line shopping and in-store shopping. T Minzy, your T-shirt looks so cool. Where did u get it ? T M I bought it online. T Really ? Do you often.
Dolch Words the of and to a in that is was.
© 2016 SlidePlayer.com Inc. All rights reserved.