logo

IT Risk Management: Biometric Systems, Privacy-enhancing Technologies, and Wireless Sensor Networks

   

Added on  2024-07-01

11 Pages2350 Words188 Views
 | 
 | 
 | 
ITC596
IT RISK MANAGEMENT
ASSESSMENT 2
1
IT Risk Management: Biometric Systems, Privacy-enhancing Technologies, and Wireless Sensor Networks_1

Contents
A. Biometric Systems......................................................................................................................3
B. Privacy-enhancing technologies (PETs).....................................................................................7
C. Wireless sensor networks............................................................................................................9
References......................................................................................................................................12
List of Figures
Figure 1: Understanding biometric technology and biometric devices...........................................3
Figure 2:Biometric Identification Techniques.................................................................................4
Figure 3: Report: Bright Future for Iris Recognition.......................................................................6
2
IT Risk Management: Biometric Systems, Privacy-enhancing Technologies, and Wireless Sensor Networks_2

A. Biometric Systems
A biometric system refers to the systems which consider a person’s any quantifiable physical
attributes that can be changed over into a computerized design for specific identification and
authentically verified. The biometric systems that are examined here are: -
1) Fingerprint
A fingerprint biometric system is acquiring finger impression electronically. It is the most
commonly used biometric system.
The local features of a fingerprint biometric are minutiae, ridge endings and ridge
bifurcations.
The global features of a fingerprint biometric are ridge orientation and pattern of ridges.
The fingerprints are used in different sectors like:-
Government sector: - For voter registration, border control, e-passport¸ national ID.
Business sectors: - To maintaining a record of, payroll management, time and
attendance, human resource management.
Finance and banking sector: - For customer identification, employee identification,
non- account holder identification, ATM machines.
Figure 1: Understanding biometric technology and biometric devices
3
IT Risk Management: Biometric Systems, Privacy-enhancing Technologies, and Wireless Sensor Networks_3

The advantages of fingerprint biometric systems are:-
High in uniqueness and permanency
Its universal form of the system used widely acceptable by every organisation.
High in the factor of accuracy.
The requirement of storage is low.
The disadvantages of fingerprint biometric systems are:
False readings may occur.
Costly
Time-consuming
For a few people, interruption happens because of the criminal examination.
2) Hand geometry:
Hand geometry biometric system is a compelling identification framework in which an
individual is recognized by the hand acknowledgement.
It is based on the extraction of finger-widths and palm- print features of hands.
The proposed hand geometry system follows two types:-
Hand geometry identification using shape context feature
Hand geometry identification using shape moment feature
Hand geometry is used for higher accuracy services at airports, government offices and in
many international corporations, the point of sales applications and employee time recording.
Figure 2: Biometric Identification Techniques
4
IT Risk Management: Biometric Systems, Privacy-enhancing Technologies, and Wireless Sensor Networks_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management: Biometric Security and Privacy in Wireless Sensor Networks
|15
|2412
|429

Biometric Systems for Access Control: Fingerprint, Hand Geometry, and Iris Recognition
|10
|2590
|244

Biometric Systems, Privacy Enhancing Technologies and Wireless Sensor Networks
|11
|2471
|380

Risk Management: Biometric Methods, PETs, and WSN Threats
|12
|2839
|231

Different Types of Biometric System and Privacy Enhancing Technologies in IT Risk Management
|10
|2170
|121

Assessment 2: Biometric Systems, Privacy Enhancing Technologies, and Wireless Sensor Network Security
|13
|2735
|90