Network Security Assignment: Biometrics

Added on - 28 May 2020

  • 91

    pages

  • 23282

    words

  • 5

    views

  • 0

    downloads

Showing pages 1 to 8 of 91 pages
Running head: INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGYIncreasing the network security using biometric technologyName of the Student:Name of the University:Author note:
2INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGYAbstractOver last few of the years, new areas into the engineering science are established whose productswould create a large market in the future. Biometrics technology is considered as a solution touser identification along with security problems in today’s network. Abuse of password andmisuse of confidential information are network security issues in the organization. This type ofissues is raised due to human error, carelessness of the human and cases of maliciousness.Biometrics technology removes the human errors from the security. This research studyexamines technological as well as feasibility aspects along with the practical applications. Inorder to identify the users, various types of biometrics technologies are discussed in this study.The system is pattern recognition system that recognizes users by determination of authenticityof behavioral and physical characteristics by the user. Based on the research context, the systemis able to operate with verification as well as identification mode. This identification systemconsists of advantages and challenges which are analyzed in this research study. Based on thechallenges, solutions are also provided to improve the biometrics challenges. In this paper, anoverview is provided in field of biometrics and summarizes its different types and securityconcerns.
3INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGYAcknowledgementConducting the research study enhances me to improve my knowledge as well as analyticalability. It gave me the chance to face challenges all the while and conquer them. It will not bepossible to conduct the research without the significant direction of my professors, companionsand every one of who have added to this advancing knowledge. I also want to thank mysupervisor __________ for helping me in my research work as well as give their full supportduring the research process. I would also thank all the participants within this study for givingtheir time and helping me out. From the support of people, I am inspired to work on the researchin this subject area. Finally, thank you to my family members those help me and encourage me.Thank You.
4INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGYTable of ContentsChapter 1: Introduction.....................................................................................................................91.1 Background of the study.............................................................................................................91.2 Research Aims and Objectives..................................................................................................101.2.1 Aims of the study...................................................................................................................101.2.2 Objectives of the study...........................................................................................................101.3 Research Questions...................................................................................................................101.4 Problem Statement....................................................................................................................111.5 Rationale of the study................................................................................................................111.6 Structure of the research study..................................................................................................121.7 Summary...................................................................................................................................14Chapter 2: Literature Review..........................................................................................................152.1 Preface.......................................................................................................................................152.2 Overview of biometric technology............................................................................................152.3 Applications of biometric technology.......................................................................................202.4 Identity management by biometrics..........................................................................................242.5 Advantages of using biometrics technology.............................................................................262.6 Operation of biometric system..................................................................................................312.7 Evaluation of different biometric technology and its comparison............................................332.8 Factors and criteria used to compare biometric technologies...................................................392.9 Comparison of different biometric technologies.......................................................................402.10 Safe and secured biometric technology...................................................................................412.11 Challenges faced for using biometric technology...................................................................422.12 Overcome of challenges for using of biometric technology...................................................452.13 Summary of the project...........................................................................................................47Chapter 3: Research Methodology..................................................................................................493.1 Preface.......................................................................................................................................493.2 Research outline........................................................................................................................493.3 Research philosophy.................................................................................................................503.4 Research approach.....................................................................................................................513.5 Research design.........................................................................................................................52
5INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGY3.6 Data collection processes and techniques.................................................................................543.6.1 Data Collection sources..........................................................................................................543.6.2 Data collection techniques.....................................................................................................553.7 Sample and sampling................................................................................................................553.8 Ethical considerations...............................................................................................................563.9 Timeline and project schedule...................................................................................................573.10 Gantt chart and WBS...............................................................................................................613.11 Milestones...............................................................................................................................633.12 Summary.................................................................................................................................63Chapter 4: Data Analysis and Findings...........................................................................................644.1Preface........................................................................................................................................644.2 Data Analysis and Research Findings.......................................................................................644.3 Summary...................................................................................................................................78Chapter 5: Conclusion and Recommendations...............................................................................805.1 Conclusion.................................................................................................................................805.2 Recommendations.....................................................................................................................825.3 Future scope and limitations of the research study...................................................................83References.......................................................................................................................................85Appendices......................................................................................................................................91Survey questionnaire on “Increasing Network Security using Biometric Technology”.................91
6INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGYList of tables1.2.1 Aims of the study......................................................................................................101.2.2 Objectives of the study.............................................................................................10Table 1: Comparison table of various biometric technologies..........................................41Table 4.1: Gender of participants......................................................................................64Table 4.2: Years of working..............................................................................................65Table 4.3: Satisfaction level of employees........................................................................66Table 4.4: Network security issues....................................................................................67Table 4.5: Effectiveness of biometric technology.............................................................68Table 4.6: Benefits of Biometric Technology...................................................................69Table 4.7: Applications of biometric technology..............................................................71Table 4.8: Factors for comparing biometric technologies.................................................72Table 4.9: Issues in Biometric technology........................................................................73Table 4.10: Recommendations to improve network security in your company................74
7INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGYList of figuresFigure 2.1: Different types of biometric technologies.......................................................20Figure 2.2: Structure of Biometric System........................................................................21Figure 2.3: Block diagram of enrollment phase................................................................33Figure 2.4: Block diagram of verification phase...............................................................34Figure 2.5: Block diagram of identification phase............................................................35Figure 2.6: Block diagram of face recognition system......................................................37Figure 2.7: Block diagram of fingerprint identification....................................................38Figure 2.8: Block diagram of iris scans.............................................................................39Figure 2.9: Block diagram of signature recognition system..............................................40Figure 2.10: Voice recognition system..............................................................................41Figure 1: Gantt chart..........................................................................................................63Figure 2: Work breakdown structure.................................................................................64Figure 4.1: Gender of participants.....................................................................................67Figure 4.2: Years of working.............................................................................................67Figure 4.3: Satisfaction level of employees.......................................................................68Figure 4.4: Network security issues...................................................................................69Figure 4.5: Effectiveness of biometric technology............................................................70Figure 4.6: Benefits of Biometric Technology..................................................................71Figure 4.7: Applications of biometric technology.............................................................73Figure 4.8: Factors for comparing biometric technologies................................................74Figure 4.9: Issues in Biometric technology.......................................................................75
8INCREASING NETWORK SECURITY USING BIOMETRIC TECHNOLOGYFigure 4.10: Recommendations to improve network security in your company...............76Chapter 1: Introduction1.1 Background of the studyBiometric technology is one of the fastest gaining popularity in terms of securitymeasures for minimizing the cases of fraud and theft due to the use of physical characteristicsand traits for identifying individuals. Previous methods of biometric identification consistedfingerprint as well as handwriting, whereas current inventories include iris or eye scan, voiceprint, hand print and face scan (Gavrilova et al., 2017). On the other hand, biometric voicerecognition and technology for identification concentrates on training the particular system inorder to recognize unique voice characteristics of individuals. The technology lends well todifferent types of utilization and application such as security access control for mobiles, ATMmanufacturers and automobile manufacturers (Gupta, Agrawal & Yamaguchi, 2016). On theother hand, network security is protection for access, misuse and directories of network system.Biometric technology is helpful for mitigating security issues in networking.According to Acuity Market Intelligence, the market for biometrics core technology haspoised for making sustainable development with global revenues that has reached approximately$11 billion annually by 2017. Moreover, biometric industry continues to increase that resultscorrelation to private sector starting to take off. On the other hand, private sector has beenaccounted 41% of biometric revenues (Saevanee et al., 2015). The private sector has beenprojected accounting 55% of industries revenues by 2017. It is going to outpace public sector foradvancements and new biometric applications in recent activities. The organizations are starting
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Unlock This Document