Summary Physical Access & Time and Attendance PC/Network Access

Slides:



Advertisements
Similar presentations
CONFIDENTIAL 1 Preparing for & Maintaining PCI Compliance.
Advertisements

© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
UNIQUE PATIENT ID Use of National IDs to identify patients.
NIH is a Valuable Place with Valuable People: We Need to Protect it! Cyber threat is one of the most serious economic and national security challenges.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
The Evolution of the Trusted Traveler Concept September 2010.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
Beach Park Schools Beach Park, Illinois Introduces.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
Government Applications of Biometric Technologies Border & Aviation Security 19 June 2003.
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
European Electronic Identity Practices Country Update of Norway Speaker: Sverre Bauck Date:
FIT3105 Smart card based authentication and identity management Lecture 4.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
LP 400. General Issues faced by Business Organizations:  Attendance Proxy through “buddy punching”  Errors when computing time  Cost of paper time.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
African Banking Technology Conference 3 April 2008 Nairobi - Kenya Patrick Mburu Director, ATS - Africa.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - I October 17, 2005.
BUSINESS B1 Information Security.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
DigitalPersona, Inc. Biometric Authentication for Digital Authentication Presented by: Brian Farley, Western Sales Regional Manager DigitalPersona.
Le Trong Ngoc Security Fundamentals Entity Authentication Mechanisms 4/2011.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
General Session/ Presentation: “Cross Training: Security Best Practices from Other Industries”.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Biometrics Applications - II October 19, 2005.
Identity Management Working Group 2006 Member Meeting Tempe, AZ Barry Ribbeck Rice University.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Belgian EID Card 15/12/2004 Derette Willy eID program manager.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Electronic Banking & Security Electronic Banking & Security.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
Biometrics in the Banking Industry
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Global Biometrics Market to.
Challenge/Response Authentication
Mastercard Identity Check Mobile
BUSINESS DRIVEN TECHNOLOGY
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
ESign Aashutosh.
A Seminar Report On Face Recognition Technology
Electronic Payment Systems
Unique Identification Number Project
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Biometrics.
BY GAWARE S.R. DEPT.OF COMP.SCI
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Security Barriers Asset Proper Access Attack Security System
Getting Started Basic Paperwork I-9 W-4 Direct deposit
State of e-Authentication in Higher Education Bernie Gleason
Global Biometric System Market : Trends, Forecast, and Opportunity Analysis 1.
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
The Financial Services Sector Opportunity
Who Uses Encryption? Module 7 Section 3.
Biometrics.
Operating Systems Security
Legal Framework for Civil Registration, Vital Statistics
Biometric technology.
E-Commerce for Developing Countries (EC-DC)
Strong Password Authentication Protocols
Enterprise Resource Planning
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Getting Started Basic Paperwork I-9 W-4 Direct deposit
Presentation transcript:

Summary Physical Access & Time and Attendance PC/Network Access Retail – ATM – Point of Sale Criminal Identification Financial Services Health Care Law Enforcement Government Applications Travel and Transportation E-Commerce and Telephony Citizen Identification Surveillance

Application of Biometrics Industry Application Technology biometrics compliments / replaces Physical Access & Time and Attendance Verify or identify the identity of individuals entering or leaving an area, typically a building or room, at a given time. Keys, tokens and badges PC/Network Access Identify or verify the identity or individuals accessing PCs, PDAs, network applications, and other PC oriented resources Passwords and tokens E-commerce and Telephony Identify and Verify the identity of individuals conducting remote transactions for goods and services Passwords, PINs, and challenge and response interaction Retail – ATM – Point of Sale Identify and Verify the identity or individuals conducting in-person transactions for goods and services. Cards and photo identification, PINS, or signatures

Application of Biometrics Industry Application Financial Services Biometric implementations will be attributable to new transactional and percentage based models, as biometrics are used to secure and provide non-repudiation for medium to high end financial transactions. Furthermore, this revenue will likely be generated by non-biometric companies with broad enough reach to enable transactional biometric infrastructure for financial institutions. Health Care The use of biometrics in health care environments are already being deployed in modest, employee-facing implementations. Areas of increased biometric revenue will come from protection of patient data on internal networks, customer facing applications, and biometric software Law Enforcement Law enforcement applications of biometric technology revenues have been almost entirely attributable to deployment of AFIS systems, used in local, state, and national levels – domestically and abroad to identify suspects in criminal applications Government Applications Usage will be derived mainly from Citizen ID programs, although the Government Sector will be a major adopter of biometrics for many applications

Application of Biometrics Industry Application Citizen Identification Identify and verify the identity of individuals in their interaction with government agencies for the purposes of card issuance, voting, immigration, social services, or employment background checks. Travel and Transportation Has been deployed for employee physical access and piloted for frequent travelers. Programs such as INSPASS expedite passenger movement through customs using hand scans. Surveillance Identify or verify the identity of individuals present in a given space or area. The biometric is used to complement or replace authentication methods such as manual monitoring of cameras. Criminal Identification Identify or verify the identity or a suspect, detainee, or individual in a law enforcement application.