Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.

Slides:



Advertisements
Similar presentations
Business Plan and Outstanding Issues for Illinois Justice Network Portal IIJIS Technical Committee Meeting January 16, 2004.
Advertisements

ONS Research Data Access Strategy AGENDA Background and context Confidentiality The Strategy.
Welcome The challenges of integrating service user and carer experiences into the Health and Social Care curriculum Reflections on an Open University.
International Business and Technology Consultants AMS confidential & proprietary Identification Security Meeting The New Challenge Barry Goleman American.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Maine SIM Evaluation: Presentation to Steering Committee December 10, 2014.
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
Truven Health Analytics State Exchanges - Data Collection & Analysis April 2014.
Information Security Policies and Standards
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
1 Suzanne Lockhart M.A. Criminology thesis University of Melbourne, 2005 Current: PhD candidate University of S.A Identity Fraud – Displacement effects.
First Practice - Information Security Management System Implementation and ISO Certification.
Risk Management Vs Risk avoidance William Gillette.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
National Smartcard Project Work Package 8 – Security Issues Report.
1 EDUCAUSE Midwest Regional Conference Top Strategies for Working with Stakeholders: Synopses of Recommendations from the Identity Management Summit Mark.
Insight Consulting Exercising the Top Team Simon Langdon, Principal Consultant.
Sierra Systems itSMF Development Days Presentation March 4 th, 2014 Colin James Assyst Implementation Specialist.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Lee Kinsman (soon to be) Consultant, Chamonix IT Consulting
Appendix 2 Automated Tools for Systems Development © 2006 ITT Educational Services Inc. SE350 System Analysis for Software Engineers: Unit 2 Slide 1.
Business Analysis: A Business Unit Perspective International Institute of Business Analysis January 18, 2012.
Industrial Engineering Primary Responsibilities within the Service Industry Institute of Industrial Engineering Industry Advisory Board Business Planning.
HIPAA COMPLIANCE WITH DELL
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Industrial Control Security & Access Control Facilities Management UNECE International Forum on Trade Facilitation Geneva, Switzerland May
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
© OECD A joint initiative of the OECD and the European Union, principally financed by the EU Leeds City Council’s Approach to Sustainable Procurement Tony.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
© Dr. John T. Whiting All Rights Reserved Slide 1 Information Technology – The Key to Public Education Reform Based.
CommSee - a client service systems development strategy using .NET
Eliza de Guzman HTM 520 Health Information Exchange.
General Session/ Presentation: “Cross Training: Security Best Practices from Other Industries”.
Evaluation of Denmark’s Climate Change Funding to Developing Countries Overview of the Findings DIIS Seminar Copenhagen 30 September 2015.
Bank Audit. Internal Audit Internal audit is an independent, objective assurance activity and can give valuable insight in providing assurance that major.
Patient Confidentiality and Electronic Medical Records Ann J. Olsen, MBA, MA Information Security Officer and Director, Information Management Planning.
Providing Exclusive Services: Business Oriented Document Management Solution for Enterprise Alexander Mitrovich, Director Corporate Clients Nikolay Priezhiy.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Cross-Border Cooperation November 17, Purpose Highlight how Canada and US advance cross-border cooperation  Canada-US law enforcement context.
Working with HIT Systems
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
DIGITAL SIGNATURE.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Enterprise Cybersecurity Strategy
Challenges of Federated Authentication to TeraGrid and Open Science Grid Jim Basney
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Biometrics and Security Colin Soutar, CTO Bioscrypt Inc. 10th CACR Information Security Workshop May 8th, 2002.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
IAM VISION OUR CREATIVE INSPIRATION IAM STRATEGY & ROADMAP TEAM JUNE 3, 2015.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Making ECM Work for Your Company: Things to Consider to Ensure Success Johnny Gee CTO & Principal Architect Beach Street Consulting.
CMGT 430 OUTLET Teaching Effectively/ FOR MORE CLASSES VISIT
IS&T Project Reviews September 9, Project Review Overview Facilitative approach that actively engages a number of key project staff and senior IS&T.
Transforming business
Areas Separate Approaches Parallel Approaches Joint Approaches
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
Document verification and identity management
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Wavestore Integrates…
True Identity at The Airport
Web Information Systems Engineering (WISE)
Presentation transcript:

Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan Security and Privacy Consulting Inc.

Enhancing Information Systems Security Through Biometrics October 2004 Agenda Context Issues Assets Principal Threats Security Requirements Security Model Security Risk Management Strategy

Enhancing Information Systems Security Through Biometrics October 2004 Why a security strategy? Complexity and scope Status of study Performance of technology Decisions

Enhancing Information Systems Security Through Biometrics October 2004 Context: Multiple Applications User communities User continuum Documents

Enhancing Information Systems Security Through Biometrics October 2004 Context: Business Drivers Document integrity Identity management across programs

Enhancing Information Systems Security Through Biometrics October 2004 Context: The Challenge Technology study Business requirements Real world deployments Scope Complexity

Enhancing Information Systems Security Through Biometrics October 2004 Issues Facilitation versus Security Enrolment Client diversity Entitlements

Enhancing Information Systems Security Through Biometrics October 2004 Assets Reference biometrics System(s) that use biometrics Programs

Enhancing Information Systems Security Through Biometrics October 2004 Principal Threats Counterfeit and altered documents Improperly obtained and issued Impostors

Enhancing Information Systems Security Through Biometrics October 2004 Security Requirements Reference biometrics –Authenticity –Availability –Confidentiality Technology and Processes –Enrolment –Identification –Verification

Enhancing Information Systems Security Through Biometrics October 2004 Security Requirements Program integrity –Technology performance –Uses –Client continuum

Enhancing Information Systems Security Through Biometrics October 2004 Security Model Program Integrity Systems and processes Reference biometrics A S S E T S

Enhancing Information Systems Security Through Biometrics October 2004 Security Model Impact of Safeguards Business/ Technology Match Program Integrity Systems and processes Reference biometrics A S S E T S

Enhancing Information Systems Security Through Biometrics October 2004 Security RM Strategy Programs Client Continuum Systems and Processes Reference Biometrics

Enhancing Information Systems Security Through Biometrics October 2004 Security RM Strategy Programs Client Continuum Systems and Processes Reference Biometrics Test: Accuracy, Functionality, Performance … Design, Functionality, Safeguards … Cross Program Requirements: Facilitation, Life Cycle ….

Enhancing Information Systems Security Through Biometrics October 2004 Security RM Strategy Programs Client Continuum Systems and Processes Reference Biometrics Security Plan System TRAs TRAs Test: Accuracy, Functionality, Performance … Design, Functionality, Safeguards … Cross Program Requirements: Facilitation, Life Cycle …. RM Continuum

Enhancing Information Systems Security Through Biometrics October 2004 Conclusions Aim and objectives Technology Strategy versus tactics

Enhancing Information Systems Security Through Biometrics October 2004 Questions?