Juan Ortega 12/15/09 NTS490. Justification/purpose to deploy biometrics: The university decided to come to the 21’st century and upgrade the already implemented.

Slides:



Advertisements
Similar presentations
Security Policy. TOPICS Objectives WLAN Security Policy General Security Policy Functional Security Policy Conclusion.
Advertisements

Computer time and attendance system for small business with up to 50 employees. 3 terminal types to chose from. Install your self, or have our technicians.
GBA 573 Final Presentation Jonathan Stone Summer 2003.
Checking & Corrective Action
Lotus Notes - the University of Nebraska Experience Greg Gray University of Nebraska Central Administration Computing Services Network.
Environmental Management System (EMS)
SL21 Information Security Board Mission, Goals and Guiding Principles.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
PRESENTED BY : DUA RAZA CLASS IX. FINGERPRINT IDENTIFICATION Among all the biometric techniques, fingerprint- based identification is the oldest method.
Chapter 14 Network Design and Implementation. 2 Network Analysis and Design Aspects of network analysis and design Understanding the requirements for.
ICASAS305A Provide Advice to Clients
THE FINGERPRINT  The reader acquires the fingerprint image.
AFISS Prospectus of Services AFISS offers HACCP food safety and food quality systems development and management services including preparation for regulatory.
Quality Management System
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
4. Quality Management System (QMS)
4. Quality Management System (QMS)
Change Advisory Board COIN v1.ppt Change Advisory Board ITIL COIN June 20, 2007.
Release & Deployment ITIL Version 3
Project submitted by: Swaroop Borukar Kinjal Patel Under the guidance of: Prof. K. T. Talele Electronics and Telecommunication Engineering Department.
QUALITY MANAGEMENT SYSTEM ACCORDING TO ISO
Configuration Management, Logistics, and Universal CM Issues Larry Bauer Boeing Commercial Airplanes NDIA Conference Miami March 4-5, 2005
MethodGXP The Solution for the Confusion.
Neuromuscular Engineering 11 Neuromuscular Engineering & Technology BioMetrics SECURE AREA VETTING AND ACCESS CONTROL.
CWNA Guide to Wireless LANs, Second Edition 1 Planning for a Wireless Network “If you fail to plan, then you plan to fail” Some steps involved in planning.
S/W Project Management
Integrated Capability Maturity Model (CMMI)
INFO 637Lecture #81 Software Engineering Process II Integration and System Testing INFO 637 Glenn Booker.
Standard WBS Version 1.0 WBS2-3.pptPage 1 Standard Work Breakdown Structure Legend = Decomposes to lower level WBS elements 4.0 Implementation 4.0 Implementation.
By CA. Pankaj Deshpande B.Com, FCA, D.I.S.A. (ICA) 1.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Managing the Validation and Migration from SAS ® to 9.2 on a New Server Carey Smoak Sy Truong.
Bring Your Business into the 21 st Century : Part 1 WasteExpo 2011 Improving Your Financial Management System.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
PASSPORT SYSTEM – STANDARD AND E-PASSPORT The Passport includes standard international Security Features such as: Hologram Ultra Violet Print (can be seen.
SENG521 (Fall SENG 521 Software Reliability & Testing Software Product & process Improvement using ISO (Part 3d) Department.
Copyright 2010, The World Bank Group. All Rights Reserved. COVERAGE, FRAMES & GIS, Part 2 Quality assurance for census 1.
Product Development Chapter 6. Definitions needed: Verification: The process of evaluating compliance to regulations, standards, or specifications.
Mailers Technical Advisory Committee John Sadler Manager, Business Mail Acceptance August 2001 Mailers Technical Advisory Committee John Sadler Manager,
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
DRS \\ 7jun02 1 Operating Principles for Very small fingerprint sensors.
Costs and Benefits. Benefits Direct Cost Reduction. Cost displacement. Revenue Enhancement. Indirect Cost Avoidance. Performance Enhancement. Risk Reduction.
9 - 2 Hazard Analysis Critical Control Point 9 - The HACCP Philosophy 3 Prevented Eliminated Reduced to safe levels If significant biological, chemical,
11 SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL Chapter 9.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Glen Fields - Final Project Presentation. What Sets CSI Apart... GBA 573 Consultants Company Background Located in San Diego, CA 5 Engineering Consultants.
Scott Butson District Technology Manager. Provide professional to all district staff Professional development has been provided on a regular basis to.
Component 8 Installation and Maintenance of Health IT Systems Unit 1a Elements of a Typical Electronic Health Record System This material was developed.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Software Life Cycle The software life cycle is the sequence of activities that occur during software development and maintenance.
Juan Ortega 12/15/09 NTS355. Microsoft Security Advisory (977544) Vulnerability in SMB Could Allow Denial of Service Flaw on SMBv2 supposedly opened two.
Validation | Slide 1 of 27 August 2006 Validation Supplementary Training Modules on Good Manufacturing Practice WHO Technical Report Series, No. 937, 2006.
PRESENTATION ON BIOMETRICS
Planning Ahead for Optimal Contact Center Deployment Jim Jenkins
Program Development Cycle
Configuration Management Romuald Duperrier Head of Systems Engineering Division April 22, 2015.
IX-1 MOD IX - ADDRESSING LEAD IN YOUR MAINTENANCE PROGRAM  Explain management’s role in a lead maintenance program  Outline the fundamental components.
Checking and Corrective Action EPA Regions 9 & 10 and The Federal Network for Sustainability 2005.
BIOMETRICS.
Tommy Truong. Objective : To enhance noisy fingerprint images in order to be processed by an automatic fingerprint recognition system, which extracts.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
BY AMAR P. NARKHEDE MAINTENANCE PLANNING. PLANNED PROGRAMME FOR MAINTENANCE Phase I 1. Prepare a list of all machines and equipments to be covered and.
Grid Deployment Technical Working Groups: Middleware selection AAA,security Resource scheduling Operations User Support GDB Grid Deployment Resource planning,
Risk management.
World Health Organization
Biometric technology.
1 Stadium Company Network. The Stadium Company Project Is a sports facility management company that manages a stadium. Stadium Company needs to upgrade.
Presentation transcript:

Juan Ortega 12/15/09 NTS490

Justification/purpose to deploy biometrics: The university decided to come to the 21’st century and upgrade the already implemented biometrics. Newer biometrics devices have a higher accuracy rate. Access-control system Potential for newer biometric devices. The new biometric devices will be used for in various facilities around the campus such as: Resident Halls Athletic facilities Limit dining-hall access

Fingerprint Recognition The best biometric device to implement for this specific scenario would be fingerprint recognition. Cheap Fast Small sized Low power Fairly accurate Easy-to-use  Number of ridges and valleys on the surface of the finger.  Ridges are the upper skin layer segments of the finger and valleys are the lower segments.  The ridges form so-called minutia points ridge endings.  The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. Fingerprint biometrics. Retrieved December 15, 2009 from biometricnewsportal Web site:

Because the previous biometric implementation happened in 1972, much of the installation, configuration, and operational processes will need to be modified for this new technology. The previous biometric deployment policy would also need to change, but the main principles will remain, some of them are:  Public acceptability  Practicality of capture  Practicality of deployment  ROI Biometrics Deployment of Machine Readable Travel Documents. Retrieved December 15, 2009 from aclu Web site:

1) Location of the centralized access-control system. 2)Total cost and the ROI must be calculated. 3) Compatibility with the current infrastructure. 4) Regulatory 5) Operational 6) Training and user acceptance.

1)Remove old biometric devices 2) Identify the locations where a biometric device is needed. 3) Depending on the device, some need to be screwed as a door handle, while others are just for identification. 4) If the devices are wireless, a wireless access point needs to be establish prior to the implementation. 5)Software for identification and verification needs to be installed. 6)Verification process begins to ensure all equipment and software is installed properly.

 Installation Plan  Make sure everything's installed.  Everything’s tested  Training Plan  Initial user training for the biometric.  Communication Plan  Clear, timely and consistent communication.  Schedule  Maintenance  Other deployment documents  Risk Assessment  Deployment Design