logo

ITC595 Information Security - Doc

   

Added on  2021-05-30

4 Pages4949 Words221 Views
ITC595 Research Project (Biometrics)A. AuthorITC595 MIT, School of Computing & Mathematics, Charles Sturt Universityauthor@first-third.edu.auABSTRACTThroughout the past decades the Biometric,technology has become an important tool in terms of fingerprintscanning, iris and face recognizer etc. for improving the security andprivacy. It has been found that the implications those includebiometric components in their identification process are extremelyprone to the security risks. It is projected that, technologicalapplication those attempt for resolving the identified issuesassociated to biometric components, this is important to emphasizethe main privacy aspects trough biometric implementations.Biometric authentication represents the prospect of electronic levelsecurity and privacy. Biometric authentication system can recognizeindividuals considering their anatomical traits in terms offingerprint, palm print, iris, voice etc. All of these traits are linkedwith the users that enable only authorized users access. Biometricinformation is always unique in nature and extremely successful inmaintaining privacy and security. With the help of the appropriatesensor initially the biometric system records the sample of thebiometric traits of the users. After that, all the salient features arecharacterized from the sample. Biometric system gives adequateidentification opportunities and reduces the rate of risks throughconnecting personnel and all other specific actions. Biometricauthentication gives efficiency, scalability, reliability andprofitability to the forensic departments for identifying individualpersonnel. This kind of systems are convenient and its access aregranted with biometric password such as fingerprint, iris scan etcbut not with any kind of smart cards.KeywordsBiometric, Biometric cards, Privacy, informationsecurity.INTRODUCTIONThe introduction of the Biometric system has taken newstrides as we usher into the next decade. These cards arepersonal identity cards that provide for a personalidentification tool, address proof and are linked to theNational Identity Register in countries like the UnitedKingdom. Many Europeans countries have consideredadopting this system to have a much more synchronizedprocess of identification as well as the compilation of datawith regard to the citizens of the countries (Ahmed & Malik,2013). The Identity Cards Act 2006 was enacted in the state ofEngland to bring out such procedure of enforcing uniqueidentity identification system, which shall have the details ofthe people residing in the country with regard to their privateand public information. "As the move towards e-Governmentgathers pace in Europe, the impact of the digitalization ofmany citizen-state interactions is beginning to challengeaccepted wisdom on what digital citizenship consists of, whatits risks are, and how they might be managed in the newdigital era. In the evolving relationship between e-Governmentand the digital citizen, of growing importance is the role-played by new identity management systems (IDMS) and theintroduction of electronic ID cards? E-Government projectsoften involve large-scale sharing of data, much of it personaldata about citizens, and increasingly these projects involve thepersonal identification and authentication of individual citizensas they use electronic public services.” (Bank, 2017)A.Research Problem In today’s IT driven society, technology is all pervasive. Inalmost all aspects of life, the role of technology is all tooevident to ignore. As the threat of viruses increase in thesoftware world, the companies try to come out with the latestanti-virus updates and the cycle seems to go on. Similarsituation exists in matters concerning security and privacy.Many a times, efforts are made by scrupulous elements tosneak in sanitized zones and cause discomfort to generalpublic or destroy the security setup. Instances involving thetheft of data from secure zones, theft of items from a retailstore, fitting a timer bomb inside the metro tube, hijacking apassenger aircraft by smuggling in arms and ammunitioninside a passenger aircraft, etc are the kind of instances whichhave forced the security agencies to go for an upgraderegularly. Technology proves to be quite helpful in devisinggadgets and devices required for firming up the securityapparatus help in these applications.B.Research Justification This research study is being undertaken to analyse howpredominant the role of technology happens to be in handlingthe security issue in general and how the biometric technologyhas helped the security system in dealing with difficultcircumstances. Biometrics can help during elections,authorised entry into an office, firming up security, preparing adatabase of the citizens etc. In fact there are some officeswhich make good use of biometric devices to ensurepunctuality and discipline amongst the workforce. An effortwould be made during the study how biometric system canLITEERATURE REVIEWBiometric cardsThese biometric cards have a great amount of use and thegovernment introduced the same in order to cut down on thewastage of resources and to ensure national security.According to ministers, this card was introduced so thatpeople would not have to have various other cards as per theiridentity proof and thus it would make identification for owningcertain products, traveling around the country and abroad etc.better. Furthermore, it would help the government to easilykeep a tab on each citizen residing within the country and thecitizens would be able to use the social security serviceswithout misusing the same (Awad, 2017).After conducting various meetings and consultationsregarding the introduction of such a system for the purpose ofevaluation and tracking of every citizen within the country, thegovernment decided to go ahead with the same because themain merit of working with this system in place would meanthat the government has the ability to clearly and properlyidentify each and every person living in the country and thus

have his records, which would further lead to a large bout ofdevelopment as they would be able to understand thesituation of different people better. The government also triedto keep a check on terrorist activities and thus provided thathaving such a system in place would really help to curb thesame (BIOMET (Workshop), Cantoni, Dimov, & Tistarelli,2014).In the United Kingdom, efforts were made and the majoritypassed the implementation of the bill for the introduction ofbiometric cards in the Parliament. However, there was a greatamount of information leaked regarding the difficulty that theParliament was facing regarding the issuing of these cards interms of gathering all the information regarding the people,keeping the costs in check as well as ensuring the reliability ofhaving such a system in place. The cost and the reliabilityfactors became the two most important factors in terms ofunderstanding this very system (Chin, 2011). The cost of having this system in place has been estimatedto be around 12 to 18 billion pounds and the government hasalso been challenged on the basis of the reliability of this veryscheme because, in order to undertake this successfully, itwould have to carry out research and find out information upto date about the people at least every five years. A newdatabase linkage system would also have to be effectivelyplaced within the purview of the government in order to carryout research work and save all the information regarding thebiometrics of the people within the country (Grother,Salamon, & National Institute of Standards and Technology(U.S.), 2012). For the purpose of the ID card, photographs,proof of information as well as fingerprints would be required,which would further require more costs and take up a greatamount of time. The government was skeptical about manypeople not providing their correct information and gettingaway with fake biometric passes for the purpose of unlawfulor illegal activities. Further, it was also to be decided whetheror not this card could be used in place of the passport thatpeople already had, in order to at least travel within thecountry of Europe, because getting the same accepted byother nations would be yet another task. During a time of suchhigh crisis with respect to crimes, no country would want toallow anything less than a universally acceptable proof ofinformation regarding a person and thus these biometric cardsproved to be unreliable in terms of the same (Grother,Salamon, Chandramouli, & National Institute of Standards andTechnology (U.S.), 2013).The main effect that this card would have brought aboutwould be to reduce crime and terror and also give people easeof access as they would not have to use multiple ID cards forthe purpose of registering for products or buying assets andcreating bank accounts. However, according to critics, thesecards have only helped to take further the process of crimebecause people have been issuing fake biometric cards whichhave led to a great amount of wastage of resources anddestruction with respect to maintaining law and order withinthe country (Hidayat & Ihsan, 2011). Views on use of Biometric CardsThere have been many human rights activists and groupsthat have challenged the use of these cards in terms ofviolating human privacy. According to Gordon Brown, thesecards used in the United Kingdom should have had thecapacity of being instantly notified to the police as they wereswiped. As soon as a person entered a building via an iris scandoor, these cards were to let the police know the whereaboutsof the person. They would also have been used in order toshare confidential information about a person to the policeand have all that information stored in their database againstthe person’s will if such a situation was to arise (In Fennelly,Fennelly, & Perry, 2014). These cards would help to marginalize the weaker sectionsof society as well which would not be a boon for them. Itwould rusticate the gypsies, beggars and the other poorersections of the people from the well off and make thegovernment habituate them in a different part of the city orcountry altogether. Even though the government argued thatthese cards were required in order to remove identity theft,such a situation cannot be completely erased by having thissystem in place. It is important for any government, especiallya democratic one, in order to ensure that its people aresatisfied and happy. Every government can only do that byknowing and understanding the status of the people, whichcan further be done by collecting their information. However,activists argue that using these cards simply takes this entireexercise to a whole new level where each person’sinformation is available to the police who have a track on thewhereabouts of every man roaming the country because of hiscard swiping activities. This was not taken well by the peoplebecause it hinders privacy issues and leads to petty problemswhich the police would have to further look into and solve.This would involve new rule making which would again be atedious process (In Kakadiaris, In Scheirer, In Hassebrook, &SPIE (Society), 2013). Privacy protection using BiometricsFor system administrators and internet users, security hasbecome a primary concern. Whether one needs to protectprivate information and data in one’s file, to lock tounauthorized users, a computer system, individuals need toget a suitable level of security. This appropriate security is alsorequired to regulate access to an extranet or an intranet, or totransact business through the internet. Determining effectivemeans of realizing this proper security is also important. Thefear of internet security has been one of the major barriers totransacting businesses electronically through the internet as amedium (In Ling, In Jin, & In Hu, 2015). With the contemporarypopularity as well as prospective profits of conductingtransactions electronically, many organization executivesexperience a conflict situation. In other words, onlineconnections to expand their sales are likely to lead to threatsand risks of intrusion. Alternatively, staying disconnected fromthis very internet will bind them to sacrifice their client contactas well as services to their existing competitors (Jahankhani,2010).Use of Biometrics to secure Business systemsIn order to transact most business dealings, and to conveyelectronic mail, the internet makes use of mail transferprotocol. These transmissions possess as much confidentialityas a postcard. In other words, it travels over untrusted andinsecure lines. This implies that anybody who is at any pointalong the path of transmission can access the message andhence read its content using the word processing program ortext viewer. Also, since these transmission lines are notsecure, forging e-mail or using the name of another person iseasy (Kavati, Ilaiah, Prasad, Bhagvati, & Chakravarthy, 2017).This has made theft of identity one of the leading fraudincidences. An individual can claim that another person sent a

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Biometric Authentication: System Security & Privacy
|6
|3012
|32

Smart Home Automation by Biometrics Assessment 2022
|14
|798
|8

The Evolution of Biometrics | Capitol Technology
|5
|707
|22

Assignment | PASSWORD AUTHENTICATION PROTOCOL.
|5
|806
|17

MANAGING INFORMATION SYSTEMS 1 MANAGING INFORMATION SYSTEMS 1 MANAGING INFORMATION SYSTEMS
|3
|431
|10

Security Assignment: Fingerprinting vs Face Recognition
|27
|7463
|220