Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Security, Privacy, and Ethics Online Computer Crimes.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics & the Privacy Paradigm: Separating Fact from Fiction Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Kusserow: “The Government Needs Comp Matching …” Published in the same journal as Shattuck. Comp matching ensures taxpayers’ money is safeguarded without.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
1 Mon. December 3, 2001A Secure National ID Card Group 8 Chris Marinak Mike Cuvelier Adam Sowers Saud Bangash.
VISD Acceptable Use Policy
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Amber Vision – June 25, 2010 Presentation to: West Virginia Board of Education Superintendent’s Leadership Institute.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Chapter 10: Authentication Guide to Computer Network Security.
General Purpose Packages
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
Anonymity, Security, Privacy and Civil Liberties
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
 Facebook  Twitter  MySpace  Windows LiveSpace.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Monday, August 10, 2015  Assessment  Topic Discussion  Research Assignments.
Entity Authentication
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Information Systems Security
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Biometrics Authentication Technology
Biometrics.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Mohammad Dastbaz, Eddie Halpin, Steve Wright Chapter 10 - Emerging Technologies and the Human Rights Challenge.
Group 1 FBI, CIA, and Homeland Security. Intoduction Original meaning of Encryption is “secrete writing” The purpose: To secure electronic commerce and.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Computer Security By Duncan Hall.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
User Attitudes Toward the Inspection of Encrypted Traffic Scott Ruoti, Mark O’Neill, Daniel Zappala, Kent Seamons Brigham Young University.
Bellwork Think about this…. Historical Event
U.S. and Texas Politics and Constitution Civil Liberties I February 3, 2015 J. Bryan Cole POLS 1336.
Add video notes to lecture
WHO WANTS THE LIVE IN A GLASS HOUSE?
Hacking: public policy
Mapp v. Ohio (1961) 367 U.S. 643.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometrics.
A SEMINAR REPORT ON BIOMETRICS
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Presentation transcript:

Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged dilemma: privacy, efficiency, and safety. Law enforcement agencies both government and public have begin to share their criminal databases (including biometrics) with each other.[1] Now that companies like Apple have the video quality to make fingerprint passwords biometric information is being gathered and used for more and more things. Countries like India have made the decision to register the biometric information of every citizen. Certain countries in the UK have decided to use encrypted RFID chips containing the owners biometric data as passports. Courts in the USA are currently considering whether forcing someone to divulge a password is forbidden by the fifth amendment. They already ruled that making someone open a biometric lock with a fingerprint or iris scan would not be a violation as that doesn't require you to divulge info, instead only to use the sensor. Biometric data: Data encoding a feature or features used in biometric verification. Is it really a good idea to have everyone's Biometric information be their identity One argument is that we can't have enough, the closer countries get to keeping a being unable to pass as someone else the harder it is for criminals and terrorists. The opposing side takes a more Orwellian mindset, they fear the loss of privacy as the steps toward a totalitarian system that stifles freedom. How much trust do you have for those in power? In conclusion, biometric information systems are; like any ideal, good in theory. However, there are thousands of ways that this idea can go wrong. We have just had an eye opening blockbuster of an awakening when Edward Snowden leaked just how much the NSA can spy on us. Couple that with the fact that the government shut itself down because the legislative body couldn't even agree on a budget, and things start looking alarmingly fragile. This trend towards lack of privacy is alarming. History books are filled with dictators that ruled through fear and the capture, killing, or exiling any who spoke against them. Ask yourself if you feel that creating this infrastructure is a good idea. We might have an acceptable warden for this info now, but what about in fifty years? All of the major countries have collected massive databases of the biometric information of known or suspected criminals and/or terrorists. More and more websites want you to sign in through you social media networks. These networks; in turn, are tracking more and more of your information. There is currently a four way struggle between anonymity, security, privacy, and efficiency. As it stands we are already leaning towards security and efficiency. The continued reliance on these biometrics and database building is a Controversial topic on the surface these technologies make everyone easier to track and (supposedly) harder to impersonate and defraud. That is a great thing if you can trust the authorities and the collectors of the information Others argue that even if whoever owns that information is trustworthy at the time, their successors might not. See Stalin, Hitler, slavery. Quotes: For: “The main advantage of biometric authentication is that it reduces the risk of information (passwords) or tokens (keys or chip cards) being stolen or passed on to unauthorized people.” India, biometrics is a central element of the Unique ID project. In Brazil, it’s widely used to access ATMs. In Hong Kong, the immigration department uses biometrics to secure borders. Against: If proper safeguards are not put in place, the use of some biometrics, like facial-recognition technology, can also be used to conduct intrusive surveillance of individuals or groups of people by governments and private companies. Why put our biometrics, faith and freedom in the hands who those who have done little to gain our trust so far?

Citations Sources Pictures Quotes for: Quotes against: