logo

Different Types of Biometric System and Privacy Enhancing Technologies in IT Risk Management

Research and discuss the different types of bio-metric systems used for access control, their techniques and technologies, advantages and disadvantages, and example applications for each type.

10 Pages2170 Words121 Views
   

Added on  2023-06-07

About This Document

This article discusses different types of biometric systems and privacy enhancing technologies in IT risk management. It explains the techniques, advantages, disadvantages, and applications of biometric systems like fingerprint, hand geometry, and iris recognition. It also explores communication anonymizers, enhanced privacy ID, and digital rights management in privacy enhancing technologies. The article provides insights into wireless sensor networks, their architecture, protocol stack, areas, and types of threats and vulnerabilities. It concludes with recommendations for mitigating the threats.

Different Types of Biometric System and Privacy Enhancing Technologies in IT Risk Management

Research and discuss the different types of bio-metric systems used for access control, their techniques and technologies, advantages and disadvantages, and example applications for each type.

   Added on 2023-06-07

ShareRelated Documents
Running head: IT RISK MANAGEMENT
IT Risk Management
Name of the Student
Name of the University
Author Note
Different Types of Biometric System and Privacy Enhancing Technologies in IT Risk Management_1
1IT RISK MANAGEMENT
a. Different Types of Biometric System
The biometric access control system is the recognition system for humans with the help
of their physical uniqueness and characteristics. The access control system is based on the
substantiation (Galbally, Marcel & Fierrez, 2014). The unique biometric data is stored in the
database of the organization or the secured zone, and this stored data is used to match the input
to the biometric system.
Fingerprint
The fingerprint sensor is the most widely used as access control system. The fingerprints
are unique, and even the fingerprints of identical twins do not have the same fingerprints.
Techniques and Technologies
The surface of the finger is made of furrows and ridges and the patterns such as arches
and swirls ensure uniqueness of each pattern. The illuminated image of the fingerprint is
translated into the digital codes for the authentication process, and it is stored in database. A
CMOS sensor is used for the extraction and mapping of characteristics of fingerprint. There are
various fingerprint scanner which can be used such as capacitive, ultrasonic and optical.
Whenever a fingerprint is provided as input in the sensor, a new template of digital data is
created (Sousedik & Busch, 2014). The matching algorithm is used to match the new template
from the template of the database and when the input template matches the database template the
user is authenticated.
Advantages and Disadvantages
Different Types of Biometric System and Privacy Enhancing Technologies in IT Risk Management_2
2IT RISK MANAGEMENT
The advantage of fingerprint recognition is that they are unique and provides accuracy.
The disadvantages are that if the database of a system is hacked or fingerprint is stolen from
surface of objects, then it can be a threat to the security.
Applications
The application of fingerprint is in security check, access and attendance in organizations
and institutes. It is used to access the mobile phones and various devices.
Hand Geometry
The hand geometry identifies the user by measuring the dimensions of hand. The hand
geometry recognition concept was developed in 1980.
Techniques and Technologies
The technology involved in hand geometry is using a camera for capturing an image of
the hand. The input data is captured by a charged couple device camera, and both the top surface
and side image of the hand is captured with the help of angle mirror. The silhouette image is
used to analyze 90 measurements including the distance between knuckles, thickness and length
of fingers (Ren et al., 2013). The three sequential image of the hand is stored as a template in the
database. This template is used for recalling the data when a user inputs their hand geometry.
Advantages and Disadvantages
The advantage of hand geometry is public acceptance of this system, ease of using and
the integration capabilities. The disadvantages of using hand geometry is that it is not as unique
as fingerprints.
Applications
Different Types of Biometric System and Privacy Enhancing Technologies in IT Risk Management_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Biometric Systems, Privacy Enhancing Technologies and Wireless Sensor Networks
|11
|2471
|380

Risk Management: Biometric Methods, PETs, and WSN Threats
|12
|2839
|231

Research on Types of Biometric Systems
|12
|2874
|127

critical evaluation - Assignment
|7
|1532
|245

Implementation Report on Fingerprint Recognition System for Class Attendance
|7
|1575
|422

Risk Management Assignment | Information Technology Assignment
|12
|2578
|59