Download presentation
Presentation is loading. Please wait.
Published byPhilip Mills Modified over 9 years ago
1
Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan Security and Privacy Consulting Inc.
2
Enhancing Information Systems Security Through Biometrics October 2004 Agenda Context Issues Assets Principal Threats Security Requirements Security Model Security Risk Management Strategy
3
Enhancing Information Systems Security Through Biometrics October 2004 Why a security strategy? Complexity and scope Status of study Performance of technology Decisions
4
Enhancing Information Systems Security Through Biometrics October 2004 Context: Multiple Applications User communities User continuum Documents
5
Enhancing Information Systems Security Through Biometrics October 2004 Context: Business Drivers Document integrity Identity management across programs
6
Enhancing Information Systems Security Through Biometrics October 2004 Context: The Challenge Technology study Business requirements Real world deployments Scope Complexity
7
Enhancing Information Systems Security Through Biometrics October 2004 Issues Facilitation versus Security Enrolment Client diversity Entitlements
8
Enhancing Information Systems Security Through Biometrics October 2004 Assets Reference biometrics System(s) that use biometrics Programs
9
Enhancing Information Systems Security Through Biometrics October 2004 Principal Threats Counterfeit and altered documents Improperly obtained and issued Impostors
10
Enhancing Information Systems Security Through Biometrics October 2004 Security Requirements Reference biometrics –Authenticity –Availability –Confidentiality Technology and Processes –Enrolment –Identification –Verification
11
Enhancing Information Systems Security Through Biometrics October 2004 Security Requirements Program integrity –Technology performance –Uses –Client continuum
12
Enhancing Information Systems Security Through Biometrics October 2004 Security Model Program Integrity Systems and processes Reference biometrics A S S E T S
13
Enhancing Information Systems Security Through Biometrics October 2004 Security Model Impact of Safeguards Business/ Technology Match Program Integrity Systems and processes Reference biometrics A S S E T S
14
Enhancing Information Systems Security Through Biometrics October 2004 Security RM Strategy Programs Client Continuum Systems and Processes Reference Biometrics
15
Enhancing Information Systems Security Through Biometrics October 2004 Security RM Strategy Programs Client Continuum Systems and Processes Reference Biometrics Test: Accuracy, Functionality, Performance … Design, Functionality, Safeguards … Cross Program Requirements: Facilitation, Life Cycle ….
16
Enhancing Information Systems Security Through Biometrics October 2004 Security RM Strategy Programs Client Continuum Systems and Processes Reference Biometrics Security Plan System TRAs TRAs Test: Accuracy, Functionality, Performance … Design, Functionality, Safeguards … Cross Program Requirements: Facilitation, Life Cycle …. RM Continuum
17
Enhancing Information Systems Security Through Biometrics October 2004 Conclusions Aim and objectives Technology Strategy versus tactics
18
Enhancing Information Systems Security Through Biometrics October 2004 Questions?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.