BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6 BIOMETRICS.

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

Biometric Onno W. Purbo Biometric Measurable physiological and / or behavioural characteristics that can be utilised to verify the identity.
Vitaly Shmatikov CS 361S Biometric Authentication.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
BIOMETRICS. SCOPE Biometrics – Still an Evolving Technology Biometrics – Past and Present How It Works? Machines for Bio Measurements Future Aspects Benefits.
FIT3105 Biometric based authentication and identity management
Iris Recognition By Mohammed, Ashfaq Ahmed. Introduction Iris Recognition is a Biometric Technology which deals with identification based on the human.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Sarchrmalsha Sarah Wilson, Christine Martin, Mallory Lehr, and Shania Wright A.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Karthiknathan Srinivasan Sanchit Aggarwal
BornholmsTrafikken April 2004 Peter Havskov Christensen, M.Sc.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Information about Biometrics and its security By Ridham Bhatt.
Management 345 Topic Project Topic: Biometrics. Group Members Jason Lang Jason Lang Kasey Minor Kasey Minor Christopher Doub Christopher Doub Eric Pulley.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
Security Peeps ALEXIS BEYKE, NAOMI BELCHER, RAYVIN EWERS, AND ADRIANNE PEECH.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
Registration systems in Migration Management
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
UNIT 15 WEEK 3 CLASS 2 LESSON OVERVIEW Pete Lawrence BTEC National Diploma Organisational System Security.
BIOMETRICS.   technology/9742-1_ html.
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Review Future Technology. Definition Biometrics refers to technologies used to detect and recognize human physical characteristics.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Retinal & Iris Scanners
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Aladdin Security We supply what others can only assure.
Physical Security Secure the room Secure the machine – 6 ways.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
Biometrics Dr. Nermin Hamza
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Biometrics Industry in voice.
Unit 7 - Organisational Systems Security
BIOMETRICS Presented By Sapin.M.
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Jenna Lutton February 26th, 2007
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Angela Cannava Ann Bhare Joe Paysse Kristal Pride
Biometrics.
Margaret Brown 3rd period October 14, 2007
Government Security Seriousness
Biometric technology.
By: Julia Elder, Anna Eades, Marques Angel
موضوع پروژه : تشخیص هویت بر اساس اثر انگشت
Presentation Outlines
BY: Michael Etse and Maverick Fermill
Presentation transcript:

BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6 BIOMETRICS

BTEC NAT Unit 15 - Organisational Systems Security Learning Objectives Implementing technology using biological information as a method of unique identification Common Technologies: Fingerprint Recognition Fingerprint Recognition Retinal & Iris Scans Retinal & Iris Scans Voice Recognition Voice Recognition Others methods in development Others methods in development

BTEC NAT Unit 15 - Organisational Systems Security Fingerprint Recognition Fingerprint Recognition Used extensively in crime detection Used extensively in crime detection Uses watery solution from ridges of fingers to allow detection by scanners Uses watery solution from ridges of fingers to allow detection by scanners Rapid laser can detect ridges on fingers Rapid laser can detect ridges on fingers Electro-static pads detection of small quantities of water in our fingerprints Electro-static pads detection of small quantities of water in our fingerprints Often used with additional ID systems eg airports Often used with additional ID systems eg airports

BTEC NAT Unit 15 - Organisational Systems Security Diagram of an Eyeball

BTEC NAT Unit 15 - Organisational Systems Security Retinal & Iris Scans Retinal & Iris Scans The retina is at the rear of the eye The retina is at the rear of the eye Retinas / Irises have biologically unique configurations – reliable method of ID Retinas / Irises have biologically unique configurations – reliable method of ID Impossible to change without damage Impossible to change without damage 2 second scans – close proximity 2 second scans – close proximity The iris near front of eye The iris near front of eye Scans wearers of glasses or contact lenses Scans wearers of glasses or contact lenses Often used in International airports Often used in International airports

BTEC NAT Unit 15 - Organisational Systems Security Voice Recognition Voice Recognition Considerable limitations Considerable limitations Voices can change in different circumstances Voices can change in different circumstances Can be bypassed by mobile phone / speaker mode / voice recording Can be bypassed by mobile phone / speaker mode / voice recording Use with other access control methods Use with other access control methods Recent improvements for people with disabilities and in games consoles Recent improvements for people with disabilities and in games consoles

BTEC NAT Unit 15 - Organisational Systems Security Other Biometric Systems Other Biometric Systems Other technologies in development Other technologies in development Facial recognition systems Facial recognition systems Behaviour recognition systems (suspicious actions or posture) Behaviour recognition systems (suspicious actions or posture)

BTEC NAT Unit 15 - Organisational Systems Security Activity 6 Activity 6 Biometrics 1. Find examples of biometrics in use today 2. Consider how these systems may evolve in the future