Biometrics in Banking Security

Slides:



Advertisements
Similar presentations
Cost Management ACCOUNTING AND CONTROL
Advertisements

Working with Information Governance
Student name Student ID Degree program Area of specialization.
Grow Your Business through Contact Centre Outsourcing Fanny Vaz Director, Personal Market Unit, CTM.
© 2010 Cengage Learning. Atomic Dog is a trademark used herein under license. All rights reserved. Chapter 15 Working in the HRM Field.
Social Network Priyanka Agrawal. Introduction Social Network is a social structure made of nodes that are tied by one or more specific types of relations.
First Practice - Information Security Management System Implementation and ISO Certification.
SAFA- IFAC Regional SMP Forum
Internal Audit Practices MINISTRY OF FINANCE OF REPUBLIC OF TURKEY Twinning Project - Kick-off Meeting Dedeman Hotel
Foreign Direct Investment (FDI) Student: Anna Iegorova Group: IE-11(e)
1 Michele Todd Microsoft Alliance Manager, Quest Member since 1996 Competencies including: Gold ISV competency Silver Virtualization competency Presenter.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Corporate Social Responsibility (CSR) and Small Firms: Theory and Reality Dr. Athanasios Hadjimanolis Associate Professor European University of Cyprus.
MANA 4328 Dennis C. Veit Human Resource Staffing and Performance Management “Beginning the Staffing Process” MANA 4328 Dennis C. Veit
LOCAL GOVERNANCE IN THE 21 ST CENTURY: FRAUD, CORRUPTION AND ETHICS (THE UGANDA EXPERIENCE) PAPER PRESENTED AT TRAINING WORKSHOP HELD AT DOCKLANDS HOTEL.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Internal Auditing and Outsourcing
CHESSS CEN Horizontal European Service Standardization Strategy Module 3: “Safety in the Delivery of Services” prepared by Axel Mangelsdorf Berlin University.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Year 12 Business Studies Operations REVIEW.
United Nations Statistics Division
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Electronic Business. What is Electronic Business? It is defined as ICT (Information and Communication Technologies) application with support to all business.
Clear Consultancies System Design proposal for Vehicle Parts Importers (IRL) Ltd Created by: Junga Ji Kavanagh, Damir Mehmedbasic, Artur Turczyn and Valerie.
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Republic of the Sudan The National Audit Chamber (NAC) Presentation to: INTOSAI Capacity Building Committee (CBC) Stockholm – September 8, 2015.
PROMOTING HUMAN RESOURCES IN THE PUBLIC SECTOR: CRITICAL ROLE OF HUMAN CAPITAL IN THE PERFORMANCE OF PUBLIC SERVICES IN AFRICA Africa’s Human Resources.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
'Change Management in European Enterprises' International Meeting Athens, September 14, 2007 Michael Spanos Managing Partner
10/19/2015 / 1 Electronic Commerce Branch UNCTAD - United Nations Conference on Trade and Development Dr. Susanne Teltscher United.
BUSINESS PLANNING AHMED JAMAL IDDRISU MDPI ACCRA TEL:
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
Exam 1 Terminology Review MIS Question 1 Information that describes a specific operational aspect of an organization: A. External B. Internal C.
Andy Lillesve Anwar Aglan Paul Moyryla
The Role and Impact of Public-Private Partnerships in Education Harry Anthony Patrinos Felipe Barrera-Osorio Juliana Guaqueta The World Bank 2009.
1 PRESENTATION TO THE TRADE SEMINAR OF THE PORTFOLIO COMMITTEE ON TRADE AND INDUSTRY 25 AUGUST 2009 BY Siyabulela Tsengiwe: Chief Commissioner.
Presentation on. By Cora, Ivy, Kelvin, Louise, Michelle, Shirley, Stephanie 2000  Introduction  Cost Advantage  Sustainability  Recommendations Agenda.
Implementation of a Risk Management System by Cameroon Customs Prepared by: Gasper KONNEH NEBA Inspector of Customs 10 July 2012.
Cengage Learning Online Solution Capabilities. Your Comprehensive Education, Training & Information Solutions Provider.
The New Normal: Sustainment and Advancement of Care for Warfighters with Extremity Trauma Fred Cecere December 4, 2015.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
2009 REVIEW AND 2010 PLAN Finance & Accounting 25 Nov 2009.
PARIS21 National Strategies for the Development of Statistics: Design and implementation issues 8 July 2010, Nouméa.
Mobile & Compliant MOBILE & COMPLIANT Peter Heather & David Costello.
Cloud Computing Guide to Legal Caroline Nguyen
Business Briefing Security Service Providers
Rawabi Holding Company Information Assurance
Outline Introduction Importance of GDP
Cisco's Assurance System
Factors for Decision Making
Al-Ahli Commercial Bank
Loan and Advances of Uttara Bank
Social Protection Interagency Board Meeting New York, 2-3 July 2012
"Praise Temple Ministries" Privacy Statement "Praise Temple Ministries" is highly sensitive to the privacy interests of consumers and believes that the.
Intro of Information assurance Byblos Bank
Saudi Reinsurance Company
Chapter 4 Systems Planning and Selection
Chapter 8: Criminal Justice Intro to Security, Instructor Name
Tool for Assessing Statistical Capacity (TASC)
Fintech eCommerce online customer experience In December last year, TBI Bank launched the first Open Market online crediting solution in Romania.
Implementation of a Risk Management System by Cameroon Customs
Improving SME Access to Finance: the Role of Government
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Implementation of a Risk Management System by Cameroon Customs
Domino Group – Recovery Plan Assessment
Final exam question format
Final exam question format
Presentation transcript:

Biometrics in Banking Security A Case Study Analysis MISY 3321 Introduction to Information Assurance Section 201 Individual Project Done By Zainab AlDawood 200800915 Instructor: Dr. Mohammed Rafiq

The Outline Introduction Case Study Background Analysis of Information Security Models used in Banking System The Benefits of Different Factors Future Research and Recommendation Conclusion

Introduction This research is concerning the security in major bank in New Zealand The Need of high Secure identification in banking and finance sector Technological issues of biometric information systems.

Case Study Background Major banks located in New Zealand are focusing on the online-based virtual services Due to Risks such as viruses and information hacking that require treatments To meet the business competitiveness, this survey indicated the highest security method

Analysis of Information Security Models Used on Banking Systems There is no efficiency in using physical devices (support the access control cards or monitoring people or automated systems) Based on comparison study includes 8 different security models ending up with the promoted one which is the biometric system!

The Benefits of Biometrics Based on Different factors Technology factors: (Accuracy, Flexibility, privacy and confidentiality). Monetary factors: (tangible “highly skilled training”, intangible “productivity, profitability”, long term sustainability). Managerial factors: (availability of resources, coping with new technology) Legal & ethical factors: (governmental law, social issues)

Future Research and Recommendation Since this research concerns only the competitive environment of banks, it needs to discuss more details and values like (cost implications). It has to go and expand its region to includes the external customers and other partners of the bank.

Thank you for listening Conclusion It discussed the banking environment using the high levels of business information integrity and overcoming the security. Mentioned a biometric project called Bio-Sec which creates appropriate security systems. Thank you for listening