AIRPORT SECURITY Christiane, Kayla, Ally, Gracie.

Slides:



Advertisements
Similar presentations
BIOMETRIC VOTING SYSTEM
Advertisements

Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
PRESENTED BY : DUA RAZA CLASS IX. FINGERPRINT IDENTIFICATION Among all the biometric techniques, fingerprint- based identification is the oldest method.
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
By Aidan Summerville.  The process inn which a person’s unique physical and other traits are detected and recorded by an electronic device or system.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
By: Monika Achury and Shuchita Singh
“OUR MISSION IS TO STRENGTHEN OUR WORLD’S SECURITY WITH BIOMETRIC TECHNOLOGY”
Much of the technology in this movie is already here.
Biometrics and Authentication Shivani Kirubanandan.
{ BORN CONNECTED © By: Autumn Coomes. Shelby Wathen, Chelsea Sams, & Cameron Buckman.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Max, Abbie, Kalen, and Cassie Members of B.U.N.S.
Airport Security. Objectives  Identify where the computer is used at the airport  State the benefits of using computers at the airport  List the steps.
Sarchrmalsha Sarah Wilson, Christine Martin, Mallory Lehr, and Shania Wright A.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6 BIOMETRICS.
Information about Biometrics and its security By Ridham Bhatt.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
BUS2302 Information Technology and the Business Student Group 2 Biometrics March 28, 2013.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
AirGuard Know who you’re flying with. AirGuard Know who you’re flying with Click Here.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
Identification and Biometrics By Jay Eichler. Introduction What is biometrics? What is biometrics? Types of biometrics Types of biometrics Controversy.
CS 6v Privacy Absolute Identification Dr.Murat Kantarcioglu Presentation based on “Database Nation”
Acalade Your everyday worriers.. Mission Statement Puns are bad, but security threats are worse. –Keep your private information private with cutting edge.
Biometrics.
 Biometrics refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification.
CUTTING EDGE TECHNOLOGIES PREPARED BY : LAIBA FATIMA CLASS: XI.
Computer Basics SystemsViruses Alternative Input Speech.
LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can.
JAAK Security Systems Angela Cannava Ann Bhare Joe Paysse Kristal Pride.
Physical security By Ola Abd el-latif Abbass Hassan.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
BIOMETRICS.
Biometric Technology Jordan Seaton CIS 320 WKU. Essay Questions Which industries would find biometric technology the most useful? Why?
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Biome-NO-trics Securing your business through biometrics so there are no tricks. Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Authentication Methods With the Focus on BIOMETRICS Ryan J. Gesler.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Challenge/Response Authentication
Challenge/Response Authentication
Stovall and Klee Security
Biometrics.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
Hailey Nealen, Rebekah O’Bryan, and Mirada McCormick
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
Outlined Plan We will have initial retinal and fingerprint scans at check-ins for passengers that go with the person’s identity. There will be retinal.
Angela Cannava Ann Bhare Joe Paysse Kristal Pride
Ian Ramsey C of E School GCSE ICT On the move Final steps.
Biometrics.
Margaret Brown 3rd period October 14, 2007
Christiane, Kayla, Ally, Gracie
Biometric technology.
By: Julia Elder, Anna Eades, Marques Angel
Mother Baby Security By: Lynzy Swartz, Grace Broughton,
Etc..
Presented by: k.ramya krishna
Campbell’s Security Co. ™
K.C.C.A. : Key Crime Ceasing Association
BY: Michael Etse and Maverick Fermill
Presentation transcript:

AIRPORT SECURITY Christiane, Kayla, Ally, Gracie

The Virginia Company Est “An American Company” ✈ We started in 1888 with a basic camera prototype and dream to be the most successful biometric security system makers in America. ✈ We are located in Richmond, Virginia, where the founders of this company first started ✈ We make biometric security systems for American airports. We make systems such as iris scanners, voice recognition, and fingerprint scanners.

Security plan ✈ Our plan is to assign everyone a barcode number, kind of like an identification number. This barcode will secure that you are who you say you are. This will be apart of the process of getting into the terminal, along with the scan of your foot that will be taken ✈ In order to protect your barcode from being stolen, you will need to assign a password to your barcode as well. As you can see, we’re very thorough in our identification checks ✈ Hygiene stands as an issue, but we have designed a cleaning system to help resolve the issue. After each person, a new formulated bacteria spray will spray across the scanner, then a windshield wiper like arm will dry the scanner. This sounds like it takes a while, but it’s only about a 30 second process. ✈ This new piece of technology will help in keeping the danger out of our airports nation wide.

Science behind it ✈ The scanner, like a finger scanner, looks at all the ridges and curvatures of the pattern of the bottom of your foot. ✈ Foot print scanners are more practical because no one has come up with a way to beat it, plus even if your tried, the airport security will be able to see you tring to rig the system.

Accuracy/ Limitations ✈ View the pie chart below. ✈ As you can see, it hardly never woks. We’re trying to make our systems to where they always work. ✈ Passports will now have to have your personal barcode and password. Under no circumstances are you aloud to duplicate this passport. If lost, you need to report it so we can make your barcode number inactive. ✈ With the growing population, reusing a barcode will be a challenge. But, our computer systems are being updated to detect when a barcode is in use so new barcode can be made. ✈ The accuracy of these machines has beat all other scanners number wise. ✈ They are the most realistic to use in our airports to make security even more, well secure.

Success story ✈ We’re hoping by next year our systems will be in every major and minor airport in America. This is still the testing phase of the machine ✈ So far, our machines have succeeded in identifying every person. ✈ We tried a method of beating it by painting the bottom of your foot with clear paint to try and jam the machine, but it still worked fine. ✈ It works fine under tested circumstances. WOOHOO!

FAQs ✈ Privacy? ✈ Barcode theft? ✈ password breaching? ✈ beating the system? ✈ Any other questions?

THE END