 Passengers › The main idea is to make sure that the person who buys the boarding pass is the same person that, goes through security and boards the.

Slides:



Advertisements
Similar presentations
The impact of IT Around the world By Eddie Cole. The positive social impacts of IT Social networking sites are huge now, bringing in hundreds of millions.
Advertisements

Hannah King and Makayla Black.  Our goal is to better our clients way of security and help them keep a safe environment for their clients as well. 
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
BIOMETRICS: Libraries have begun to see the value of biometrics. M.G. SELVI Technical Officer Center of Advanced Study in Crystallography and Biophysics,
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
By: Monika Achury and Shuchita Singh
Internet Security Passwords.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
VOICE BOX® VOICE RECOGNITION Using YOUR Voice to Protect YOUR Identity! By Neil Madadi, Allison Wright, Ava Embry, Jacob Howard.
“Airlines and Technology” By: The Webmasters. WEB MASTERS Section 1 Stephen Cooper –Team Captain Rosmini Winfrey –DQ Leader Jason Wallace –Team Member.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
The Impact of Physical Security on Network Security
INPUT DEVICES. KEYBOARD Most common input device for a computer.
Staying Safe Online Keep your Information Secure.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Information about Biometrics and its security By Ridham Bhatt.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Collecting Data Types, coding, accuracy, file formats and the effect of data loss.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Biometrics Authentication Technology
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
By: Ash, Jess, Natasha, Eslie.  Prevent customers from using fraud identity (false tickets) when being admitted into the theme park.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Physical security By Ola Abd el-latif Abbass Hassan.
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
TEN MONEY SAVING TIPS FOR TEENAGERS BY PHILLIP QUINTANA.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Challenge/Response Authentication
Biometrics Security in Banking Systems Image processing in ATM
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Chapter 5 - Input.
Care and Use of Computers
Meghan Mumpower, Lucas McDuff, and Zach Biggers
BSC Biometric Security System
BSC Biometric Security System
Meghan Mumpower, Lucas McDuff, and Zach Biggers
A SEMINAR REPORT ON BIOMETRICS
Campbell’s Security Co. ™
Meghan Mumpower, Lucas McDuff, and Zach Biggers
Presentation transcript:

 Passengers › The main idea is to make sure that the person who buys the boarding pass is the same person that, goes through security and boards the plane with the purchased ticket.  Pilots/ employees › The idea is to make sure that no one unauthorized is trying to fly the plane, or manage passengers during flight(flight attendants). We also what to assure that everyone on the tarmac is allowed to be there.

 Fingerprint Biometrics  What does it do: Bio-metrics is technology that identifies you based on your physical and behavioral traits. › Uses  -handwriting  -hand geometry  -voiceprints  -iris structure  -vein structure.  "Biometric systems can seem complicated, but they all use the same three steps: › Enrollment : The first time you use a biometric system, it records basic information about you, like your name or an identification number. It then captures an image or recording of your specific trait. › Storage : Contrary to what you may see in movies, most systems don't store the complete image or recording. They instead analyze your trait and translate it into a code or graph. Some systems also record this data onto a smart cardthat you carry with you.smart card › Comparison : The next time you use the system, it compares the trait you present to the information on file. Then, it either accepts or rejects that you are who you claim to be." ( 09/27/12)

 " Systems also use the same three components: › A sensor that detects the characteristic being used for identification › A computer that reads and stores the information › Software that analyzes the characteristic, translates it into a graph or code and performs the actual comparisons"( 09/27/12)

 The whole system is to make sure that unknown and/or possible threats do not get on the plane, or are flying the plane.  None of your information will be shared. None of your information on recorded for someone else to obtain.  Health Safety: › The finger print pads will be wiped down after every 10 scans to avoid the risk of bacteria, or to avoid confusion between fingerprints. › The fingerprint scanner will have a protective sheet to avoid being scratched.

 Hidden Privacy › Hard to find some ones info through this system. › The tickets do not present important information (social security numbers, bank account information, etc). › All personal information of payment is not on the ticket or in the system just you fingerprint, and it is only there from the time you check your bags to the time you leave the airport.  Unsafe Information › The only way that the someone can get personal information is only if you give it to them. › Or if you are in trouble and someone fallows you to your gate and destination. (stalker).

 Optical › Scratch Resistant › Weather Durability › Larger sensing areas › Uses LED laser beams to scan › fingerprint area › Low Manufacturing Cost › Resistant to shock and ESD › More exact measurement  Capacitive › more compact › More user friendly( does not need perfect finger placement) › not a touch screen › so less cleaning and easier to avoid scratches. › Less expensive

 Optical › User error will affect accuracy › Grease and dirt affect how well sensor reads  Capacitive › Sensing Element wears out › Grease and dirt affect how well the sensor reads › Smaller sensing area › Needs ESD treatments and other protective coatings › User error will affect accuracy (finger placement has to be exact)

 We decided to produce and optical fingerprint scanner. › The reason for this is because the optical fingerprint scanner is cheaper, they are more accurate, and over time the optical scanner will need less maintenance then a capacitive scanner.  Our plan is to make sure that the person who buys the boarding pass is the same person that, goes through security and boards the plane with the purchased ticket. › To do this we are going to put a finger print scanner at the boarding pass counter, at security, and at the gate door before you board the plane. At the boarding pass station the passenger will scan their thumb and a code will be printed on the boarding pass then when you go through security you will scan you finger and the card will be scanned if they match them you are allowed to pass, same with at the gate. Although if it does not match then you will not be allowed to pass through security and you need to prove your identity.  Our plan for pilots and employees is to make sure that no one unauthorized is trying to fly the plane, or manage passengers during flight(flight attendants). We also what to assure that everyone on the tarmac is allowed to be there. › To do this we are going to have the pilot/ flight attendant scan time card the has their fingerprint code on it, which is going to notify the plane’s computer on who is allowed in the cockpit and on the plane. If a pilots finger print and the code in the computer does not match then the cockpit door will not open and the plane will not start.

 Around the world, there are thousands of companies that use biometrics, specifically fingerprinting. At companies like Qantas, Dan Murphy’s, Breville, and Unomedical employees are being monitored through a system called PeopleKey. The system tracks what times the employees arrive at work, what time they leave, even how long of a lunch break they take. This information is stored and forwarded to payroll offices so that the employees can be paid according to how much they worked. Having this accurate measurement has helped these companies save a lot of money. Other benefits to this system are that they always know exactly who is in the store or office, that way if something was to happen they would know who was actually there. It also provides an extra layer of security in the workplace, that way only the employees can get into the building. That way companies aren’t relying on the old system of using a key card to get into the building, because say you lose your card or your card gets stolen, well whoever finds it or steals it from you then has complete access to the building and if all the doors use the same card that person could then cause some real damage to your company. Somebody can’t steal your finger or your identity. That is the whole idea of biometrics, because if you do it the right way then it is always more accurate and more safe because it is all about identity, there is only one you.

 title slide : fingerprint  Title slide: pilot  cabinet-of-wonders.blogspot.com/2008/10/rule-of-thumb.html science1: pin point finger prints science2: blue fingerprint cabinet-of-wonders.blogspot.com/2008/10/rule-of-thumb.htmlhttp://archives.dawn.com/archives/  science2: eyeball & IBM computer  : Science2: how does it scan diagramhttp://computer.howstuffworks.com/fingerprint-scanner3.htm  assuring your safety: little man  privacy: grey picture  privacy: gold slide  SnsmF5x6JUNS_lUKyNZQNzMcYdrULt6_K25ae5XGQIe8BattrGnr0anOD3wE4 accuracy slide : the picture on the right. SnsmF5x6JUNS_lUKyNZQNzMcYdrULt6_K25ae5XGQIe8BattrGnr0anOD3wE4  PAF9Azwwa7Zcezvm8CYlNm_x1Y1q3MV28n7aLvfOzkH__48bhJfet9feHr_Q accuracy slide: the picture on the left PAF9Azwwa7Zcezvm8CYlNm_x1Y1q3MV28n7aLvfOzkH__48bhJfet9feHr_Q  G4Wvu3sOKHhq1pBL61aJx_5KhWMgrRhV8500vG1lAxVccA97SW5TScjx82OUhO7NpSqFAAU limitations slide: the picture on the right G4Wvu3sOKHhq1pBL61aJx_5KhWMgrRhV8500vG1lAxVccA97SW5TScjx82OUhO7NpSqFAAU  yhW6bND-QOtqZGhdaC_CLIim04P50nHSYoyH-A9gLTRpGA0gyYM0xaKJ0wozNYE limitations slide : the picture on the left yhW6bND-QOtqZGhdaC_CLIim04P50nHSYoyH-A9gLTRpGA0gyYM0xaKJ0wozNYE

 Harris, Tom. "How Fingerprint Scanners Work." How Stuff Works. A Discovery Company, 27 Sept Web. 27 Sept scanner3.htm  Wilson, Tracy V. "How Biometrics Works." How Stuff Works. A Discovery Company, 27 Sept Web. 27 Sept VIDEO ated ated