Hannah King and Makayla Black.  Our goal is to better our clients way of security and help them keep a safe environment for their clients as well. 

Slides:



Advertisements
Similar presentations
AN ATM WITH AN EYE THE FUTURE,S TECHNOLOGY
Advertisements

Banks Banking on Network Security
Banking. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
ICT at Work Banking and Finance.
Presented By The Plano Police Department Crime Prevention Unit.
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
What is Biometrics?  Biometrics is referred as an authentication system that measures the physiological and individual characteristics of a human being.
By: Monika Achury and Shuchita Singh
Biometrics and Authentication Shivani Kirubanandan.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Sarchrmalsha Sarah Wilson, Christine Martin, Mallory Lehr, and Shania Wright A.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
WELCOME TO THE SEMINAR ON Money Pad, The Future Wallet
Chapter 5 Input By: Matthew D McCoog What Is Input? Any data or instructions entered into the memory of a computer.
1 Interacting with your computer Chapter 3 Mailto: Web :
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
Information about Biometrics and its security By Ridham Bhatt.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Acalade Your everyday worriers.. Mission Statement Puns are bad, but security threats are worse. –Keep your private information private with cutting edge.
Biometrics.
By: Ash, Jess, Natasha, Eslie.  Prevent customers from using fraud identity (false tickets) when being admitted into the theme park.
Security Peeps ALEXIS BEYKE, NAOMI BELCHER, RAYVIN EWERS, AND ADRIANNE PEECH.
PRESENTATION ON BIOMETRICS
Biometric Technologies
Mr. Stasa © You should be able to:  Identify the different parts of a personal check  Complete a personal check  Endorse.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Review Future Technology. Definition Biometrics refers to technologies used to detect and recognize human physical characteristics.
JAAK Security Systems Angela Cannava Ann Bhare Joe Paysse Kristal Pride.
Protecting Your Assets By Preventing Identity Theft 1.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Aladdin Security We supply what others can only assure.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Information Systems Design and Development Security Precautions Computing Science.
An Introduction to Biometrics
Unit 9 Finance and Banking. Electronic Banking What is E-Banking Electronic banking or e- banking gives people electronic access to bank accounts and.
Biometrics in the Banking Industry
Challenge/Response Authentication
Black Ice Security Services
Challenge/Response Authentication
Stovall and Klee Security
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometric Security Fujitsu Palm Vein Technology
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Angela Cannava Ann Bhare Joe Paysse Kristal Pride
Government Security Seriousness
A SEMINAR REPORT ON BIOMETRICS
Campbell’s Security Co. ™
K.C.C.A. : Key Crime Ceasing Association
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Hannah King and Makayla Black

 Our goal is to better our clients way of security and help them keep a safe environment for their clients as well.  Also another goal of ours is to promote security in banks around the state and country. This makes sure the population is safe from unwanted spectators.

 For accessing the client’s accounts we suggest that the bank use fingerprinting through a computer mouse. This can be done at the bank’s office or at the client’s home. To back up this way is with electronic signatures.  For over the phone conversations, we suggest using voice because this identifies the person and if the person owns the right account or not.  Also for ATMs we suggest that the bank’s client select the choice of security to help the client. The choices are fingerprinting, eye scans, or voice recognition. We also suggest that the client sign up for transaction alerts to help keep the client informed when the ATM is used.

 Fingerprinting through a mouse- this system will recognize a persons fingerprints through the regular size computer mouse. This type would be offered to clients who want to open their accounts online. The sensor would pick up the right fingerprint. In the bank, regular fingerprinting can be used through the computer. It is a card put into the computer’s card slot. When they press the side of the card a reader is shown with a sensor to match previous recorded fingerprints.

 Electronic signatures- this system is a card system that already has the persons signature on it and it is inserted into the smart card reader. Then the user swipes a finger over the sensor for the card to be “unlocked”.  Voice Recognition- this system uses a spectrogram to analyze data, with the vertical axis showing sound frequency and horizontal axis showing the time elapsed. This is a very good technique to use because it is hard to duplicate.

 Eye scans- this system scans the retinas using reflecting infrared light where some of the light is absorbed and some of it isn’t. The part that isn’t absorbed is reflected back into the scanner. The blood vessels of the retina absorb more light, reflecting less light than the tissues around it. The system then measures the amount and intensity of the light reflected back in 320 places. It is then the amount is recorded into the data system to that person’s identity.

 Electronic fingerprint scans are 95% to 98% accurate, but this accuracy depends on gender, racial characteristics, and chemical residue on fingers.  Voice Recognition isn’t as accurate as some other techniques because of background noises, the client’s physical condition, and different equipment used for example a different phone.  Eye scans are the most accurate in biometrics, but in some conditions they aren’t the best. For someone who is blind or partially bind this wouldn’t be a good system for them to use. Also the darker a person’s eye is the harder it is to detect where the client’s pupil ends and where the iris starts.  Electronic Signatures can be mixed up with other peoples sometimes.

 A bad man had stolen a woman’s purse at Wal-Mart and found her ATM card in her wallet. He decided it would be a good idea to check out how much money was on the card and steal the money from her. When he pulled up to the ATM system, he put in the information on the card, but he didn’t realize what would happen next. It asked for an eye scan ( the security system the woman had chosen) and he did the eye scan not thinking what would happen next. Then an alert went off in the ATM system and the women was notified that someone was trying to use her ATM card through her transaction alerts. The man was caught and put in jail. And the woman got her purse and her ATM card back. Thanks to Mak-n-Han Security!

 Fake fingerprints can be made out of gelatin that is worn by identity thief people.  Voice recognition can be beaten by a recording of the owner’s voice of a certain phrase.  In some cases eye scans can be beaten by eye contacts and also drugs that dilate the pupils.  In electronic signatures, this keeps hackers from breaking barriers to access the document. The digital signature format uses private and public keys.

 For the ATM, everyone can choose their method of security so they can handle issues of privacy. For example they may not like eye scans so they may choose different methods.  If someone tries to hack another person’s ATM, then the owner of the ATM can choose an alternate method of security to keep hackers away.  All the privacy information is loaded into the bank’s system.

   m/blog/index.php/voice- authentication/banks-to- use-voice-recognition- systems-to-increase- customer-satisfaction/ m/blog/index.php/voice- authentication/banks-to- use-voice-recognition- systems-to-increase- customer-satisfaction/  od/securityandsafety/a/bio metricatms.htm od/securityandsafety/a/bio metricatms.htm  -does_ _do- retinal-scanners-work.html -does_ _do- retinal-scanners-work.html  signatures-for-enhanced- safety/