Fingerprint Scanners By: Jason Batchelor
|
|
- Wilfrid McCoy
- 7 years ago
- Views:
Transcription
1 Fingerprint Scanners By: Jason Batchelor Professor: Anthony Vodacek Section: Date: of 7
2 Table of Contents: Introduction...3 History...3 Why Do We Use Them...3 How Do They Work...4 Security Limitations...5 Pros and Cons...6 Conclusion...6 Bibliography of 7
3 Introduction Physical security is one of the most fundamental and primary protection mechanisms when it comes to equipment, infrastructure, and classified information. When it comes to preventing unauthorized intrusion in a controlled area, many companies and agencies have turned to biometric identification devices like the fingerprint scanner to provide this type of protection. Their historical background, necessity in providing physical security, inner workings, possible limitations, and future implementations are an important part of ones understanding of this technology. History Ancient archeological artifacts and historical items have been discovered to still retain a large number of fingerprints on them. Since this was discovered significant strides in fingerprinting and identification have been made. In 1788 a detailed description of anatomical formations of fingerprints was made. Then in 1823 fingerprints began to be classified into nine categories, (Handbook) and by the 19 th century Sir Francis Galton had developed analytical methods for fingerprint matching. As the criminal justice system evolved, there arose the need for criminals to be uniquely identified by some physically identifiable trait. Richard Edward Henry of Scotland Yard began using fingerprinting in 1901 and its success eventually lead to its increased use in the law enforcement field (Handbook). The field of biometrics was formed and has since expanded on to many types of physical identification. Still, the human finger print remains a very common identifier and the biometric method of choice among law enforcement. These concepts of human identification have lead to the development of fingerprint scanners that serve to quickly identify individuals and assign access privileges. The basic point of these devices is also to examine the fingerprint data of an individual and compare it to a database of other fingerprints. Government agencies were the first to adopt this new technology, followed by private industries, and companies. Only now, has fingerprint scanning technology been made available to the everyday consumer in a usable form. Fingerprinting devices can be found in a standard computer mouse, notebook computers and standalone peripherals. Why Do We Use Them Nearly everyone in the world is born with a fingerprint that is unique; a separate and comprehensively identifying attribute that sets us apart from the other 6.5 billon people that inhabit this world. It is because of this fact that the fingerprint has proven such a useful part of biometric security. The very reason that fingerprint scanners are useful can be found in this fact as well. However, this is far from the only reason they are used. 3 of 7
4 Another important reason fingerprint scanners are used is, they provide a quick, easy, efficient, and secure measure through which, an individual with the proper access privileges can authenticate. The fingerprint of an employee for example, is stored in a database that the scanner queries every time it is used. There are two basic Boolean conditions the scanner then goes through when an individual s print is scanned. First, the print is usually searched for in a database of fingerprints, once it is found it then looks at the print to see what access privileges are associated with the print and compares them to the access they are trying to gain. If everything checks out the subject is allowed access and they are not otherwise. In any case, a log of the event is usually stored for security purposes (Doubt Cast). The size of these devices is another reason they have become so mainstream recently. Fingerprint scanners can be deployed directly near a door for access or as a peripheral to a computer for logging in. Modern day scanners have even been embedded on computer keyboards, mice, and USB devices because engineers have been able to reduce their size. Fingerprint scanners are also very versatile in the function that they can serve. The most common use may be for access restriction; however, they have served as time clocks, personal data retrievers, and even to cut down on truancy in some schools. Since they have experienced so much success in these areas, businesses are expanding upon their use and they are getting more public exposure (Do You Know). All of these reasons listed have helped contribute to the fingerprint scanner s success in our modern society. The robust physical security that it provides, combined with the sheer ease of use, and versatility make it a great choice if biometric identification is needed. This is why our law enforcement and government agencies have begun to use fingerprint scanners and continue to use fingerprints as a tell tale sign of proper identification. How Do They Work A fingerprint scanner system serves two different functions; first it needs to get an image of your fingerprint, then it needs to determine whether the patterns and ridges in your fingerprint match pre-scanned prints in its memory. Optical scanning and capacitance scanning are the two most commonly used methods by fingerprint scanners today to get a fingerprint image. Optical scanners use a charge coupled device (CCD) in order to grab the image. The CCD is the same light sensor system used in digital cameras. It contains an array of light sensitive diodes named photosites. Each of these photosites represents and records a single pixel measuring the amount of light that hit that spot (Do You Know). These light and dark images are combined to form a scanned image of the fingerprint. An analog to digital converter is then used within the scanner to create a digital fingerprint image (How Fingerprint). The whole scanning process beings when you place your finger on the scanner and the CCD camera takes a picture. An internal light-emitting device within the scanner shows the ridges of the finger, and an inverted image is 4 of 7
5 generated of the print. Dark parts of the image represent the ridges of the finger and lighter areas represent the valleys between the ridges. Before the scanned image is passed on to be evaluated, the processor makes sure that the image that was captured was a clear, sharp, and readable image. It does this by calculating the average pixel darkness in a small sample, if the image is too dark or too light it is rejected, the CCD adjusts its exposure time accordingly, and tries again (How Fingerprint). The capacitive scanner operates a bit differently. Even though the capacitive scanner generates an image of the fingerprint like the optical scanner, capacitive scanners do not use light to capture it, they use electrical current. An insulating layer makes up the surface of the scanner and the finger is pressed up against it. The insulating layer consists of many tiny conductor plates. Two of these conductor plates are joined together to form a capacitor that can store an electrical charge. The finger being pressed upon the insulating layer acts as a third capacitor plate. Once this is done the processor calculates the amplifiers output. Since the distance to the finger alters capacitance, a finger ridge will result in a different amplified output than a finger valley (How Fingerprint). It is because of this property that an image of a finger can be properly generated. The scanner reads that amplifiers output that the processor generated and determines whether it is a ridge part of a fingerprint or a valley. Once all the cells are read an image can be formed of the fingerprint. The main advantage of this is that a real fingerprint is required to activate the system which makes it much harder to trick, which will be discussed later. After the image is processed by using the optical or capacitance method, an analysis is performed on the image. Fingerprint scanners do this by comparing certain specific features of a print to another. This is referred to by professionals as minutiae (Do You Know). The software that does this uses a very complex algorithm in order to do this however; the main idea is measuring the relative positions of the minutiae in comparison with other prints. If the software finds that the measurements in two prints are the same, there s a strong possibility they are the same print. Even with this strong possibility, people have developed ways to subvert these scanning systems. Security Limitations In December 15 th 2005, Clarkson University released a study claiming that they could fool ninety percent of fingerprint scanners with a childhood favorite toy. They managed to compromise the security of some of the most complicated fingerprint scanning devices in the world using Play-Doh. They created a mold of the marks fingerprint and then pressed Play-Doh into it to obtain a replica fingerprint. When this replica was pressed against a vulnerable fingerprint scanner it was fooled into thinking it was the marks actual finger. The Clarkson team is not the only ones to fool fingerprint scanners (Play-Doh Fingers). On September 21 st 2006, the Mythbusters beat another type of fingerprint scanner that measured finger pore sweat, simply by licking the latex replica of an 5 of 7
6 authorized fingerprint. The manufacturer maintained beforehand that their print system had never been defeated (Beat a Fingerprint). Since these incidents, scanner manufacturers have been developing new methods and ways to fine tune fingerprint scanning. The philosophy seems to be the more detailed they can get the better. There are now systems that are in production that not only scan your fingerprint and sweat amount, but also take a measurement of the subjects pulse (Doubt Cast). The more barriers that are put in front of a criminal trying to break a system, the harder it becomes to do so. Pros and Cons There are many reasons that fingerprint scanner systems are used so vastly among corporations and agencies alike. They go by the who are you security system measurement which has many advantages. Physical attributes such as the fingerprint are difficult much more difficult to fake than identity cards are. Passwords can be guessed or brute forced, but a fingerprint can never be guessed or subverted this way. They also cannot be misplaced, as is the chief security risk of using cards and badges for authentication. Finally, fingerprints are a physical part of a human being, so they cannot be forgotten like one might forget his or her password (Do You Know). These pros make fingerprint scanners a formidable ally in physical security but they do have some short comings. As discussed previously, optical scanners pose a significant security risk because replica prints have been shown to defeat them. Capacitive scanners can also be fooled by a mold of a finger (Beat a Fingerprint). The main issue with fingerprint scanners has been the fact that fingerprints are not replaceable. Once someone s fingerprint is stolen, they are out of luck for the rest of their life (How Fingerprint). Even with the cons presented, fingerprint scanners are an ever increasing means of biometric identification. In the future they will most likely be part of ATM systems, door locks, and part of your checkout counter at the grocery store. Conclusion The fingerprint scanner is a piece of imaging technology that has served to protect against and prevent physical security breaches. Historically the fingerprint began being used as a means of by law enforcement to identify criminals, but now thanks to imaging technology, its use has expanded to other areas. Although, short comings have been identified in these complex systems, most corporations have begun combining fingerprint scanners with other forms of authentication to increase security. Such as, a personal identification number (PIN) to be used in association with the fingerprint scanner. The two-way authentication scheme is implemented in most major production lines thanks to the work of scientists that have set out to test fingerprint scanner security. The development of more complex methods of biometric analysis in conjunction with fingerprint image scanning technology will enable the development of an even stronger security device. 6 of 7
7 Bibliography Blass, Evan. Play-Doh Fingers Can Fool 90% of Scanners. December 11, Beal, Vangie. Do You Know -- Fingerprint Scanners. November 18, int.asp Harris, Tom. How Fingerprint Scanners Work Jayashree, Konda. Handbook of Fingerprint Recognition Untitled. Beat a Fingerprint Lock With a Photocopied Thumb. Sep 21, Untitled. Doubt Cast on Fingerprint Security. May 17, of 7
Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview
4050-350-39 Computer System Fundamentals, Prof. Hill, 1/20/2007 Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview Submitted by: Alex Getty Getty 1 With the current mindset of
More informationPenetration Testing Biometric System
Penetration Testing Biometric System A Penetration Testers Guide to Finger Print Authentication [FB1H2S aka Rahul Sasi] http://fb1h2s.com http://www.garage4hackers.com Presented @ NullCon International
More informationPasswords: Past, Present and Future. Abstract: Passwords have been used for a long time now. According to an article in wired.
Passwords: Past, Present and Future Abstract: Passwords have been used for a long time now. According to an article in wired.com the first computer password came in the early 1960s. Later in the century
More informationFingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id awaghmare194@gmail.com kazmiali786@gmail.com Contact Numbers 8097031667 9167689265
More informationDigitalPersona White Paper Guide to Fingerprint Recognition
DigitalPersona White Paper Guide to Fingerprint Recognition A DigitalPersona, Inc. White Paper July 2007 DigitalPersona, Inc. 1+ 650.474.4000 www.digitalpersona.com Table of Contents DigitalPersona White
More informationFooling Fingerprint Scanners - Biometric Vulnerabilities of the Precise Biometrics 100 SC Scanner
4 th Australian Information Warfare and IT Security Conference 2003 Fooling Fingerprint Scanners - Biometric Vulnerabilities of the Precise Biometrics 100 SC Scanner Antti Stén, Antti Kaseva, Teemupekka
More informationsolutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
More informationAssignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
More informationWHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
More informationHARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY
HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY INSTEAD OF A SECURITY PROBLEM, ENDPOINTS BECOME PART OF THE SECURITY SOLUTION SUMMARY The internet and mobility have made enterprise
More informationBiometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
More informationIDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More informationBiometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
More informationMODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION MULTI-FACTOR AUTHENTICATION A SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PAIRED WITH THE FACT THAT THREATS
More informationEnterprise Content Management. A White Paper. SoluSoft, Inc.
Enterprise Content Management A White Paper by SoluSoft, Inc. Copyright SoluSoft 2012 Page 1 9/14/2012 Date Created: 9/14/2012 Version 1.0 Author: Mike Anthony Contributors: Reviewed by: Date Revised Revision
More informationDigital Persona Fingerprint Reader Installation
Digital Persona Fingerprint Reader Installation The link to download the Fingerprint Reader Software for AXIS-ACH is http://corpcu.com/fingerprint-reader-software This will begin the download for the drivers.
More informationBYOD BEST PRACTICES GUIDE
BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create
More informationFingerprinting Information Sheet
Fingerprinting Information Sheet HISTORY Fingerprints weren t always used as a means to identify criminals. One of the first methods used to compare physical characteristics was developed in 1883 by Alphonse
More information22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
More informationStrong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
More informationSecuring corporate assets with two factor authentication
WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for
More informationForensic Science Lesson 3: Trace Evidence Analysis
Forensic Science Lesson 3: Trace Evidence Analysis History Alphonse Bertillon 1883 Created the first systematic system of individual classification & identification Detailed description of subject, full-length
More information5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business. An IDology, Inc. Whitepaper
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in Your Business An IDology, Inc. Whitepaper No matter how big your company is or what industry you are in, every business typically
More informationAlternative Methods Of Input. Kafui A. Prebbie -kafui@kafui.com 82
Alternative Methods Of Input Kafui A. Prebbie -kafui@kafui.com 82 This lesson includes the following sections: Devices for the Hand Optical Input Devices Audio-Visual (Multimedia) Input Devices Kafui A.
More informationBiometric Access Control Retail Applications Benefits of e-data Access Control with Fingerprint Key biometric reader
e-data.com 866.807.3549 Biometric Retail Applications Benefits of e-data with Fingerprint Key biometric reader The proper access control equipment can be the most cost effective measure to deter theft
More informationThe Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training
The Security Rule of The Health Insurance Portability and Accountability Act (HIPAA) Security Training Introduction The HIPAA Security Rule specifically requires training of all members of the workforce.
More informationFFIEC CONSUMER GUIDANCE
FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their
More informationBiometric authentication systems today and in the future
Biometric authentication systems today and in the future Birgit Kaschte Computer Science Department University of Auckland birgit@kaschte.de 24 October 2005 Abstract. Biometric data has been a widely discussed
More information3M Cogent, Inc. White Paper. Facial Recognition. Biometric Technology. a 3M Company
3M Cogent, Inc. White Paper Facial Recognition Biometric Technology a 3M Company Automated Facial Recognition: Turning Promise Into Reality Once the province of fiction, automated facial recognition has
More informationATM FRAUD AND COUNTER MEASURES
ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility
More informationAssessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
More informationComparing Digital and Analogue X-ray Inspection for BGA, Flip Chip and CSP Analysis
Comparing Digital and Analogue X-ray Inspection for BGA, Flip Chip and CSP Analysis David Bernard & Steve Ainsworth Dage Precision Industries Abstract Non-destructive testing during the manufacture of
More informationWhat Consumers Believe About Cloud File Sharing & Why That s a Warning to IT Pros
20151019 What Consumers Believe About Cloud File Sharing & Why That s a Warning to IT Pros TABLE OF CONTENTS THE ELEPHANT IN THE ROOM 3 ADDRESSING EMPLOYEE CLOUD SECURITY PERCEPTIONS 4 1) COMPLETELY BLOCK
More informationBiometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
More informationPassword Management Evaluation Guide for Businesses
Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various
More informationThis method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
More informationPenetration Testing //Vulnerability Assessment //Remedy
A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationGuidance on the Use of Portable Storage Devices 1
Guidance on the Use of Portable Storage Devices Introduction Portable storage devices ( PSDs ) such as USB flash memories or drives, notebook computers or backup tapes provide a convenient means to store
More informationIT Compliance Volume II
The Essentials Series IT Compliance Volume II sponsored by by Rebecca Herold Addressing Web-Based Access and Authentication Challenges by Rebecca Herold, CISSP, CISM, CISA, FLMI February 2007 Incidents
More information- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg
Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg Biometric Systems Biometrics
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationDevelopment of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
More informationTake the cost, complexity and frustration out of two-factor authentication
Take the cost, complexity and frustration out of two-factor authentication Combine physical and logical access control on a single card to address the challenges of strong authentication in network security
More informationBIOMETRIC SOLUTIONS 2013 ISSUE
BIOMETRIC SOLUTIONS 2013 ISSUE Southern Supplies Limited (SSL) was established on January 14th 1982 with one aim in mind : "To be the preferred supplier to the industries we service." Over time, our expertise
More informationIntroducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System
Introducing... The Word's Most Advance Biometric Time Attendance Door Access Security System EC50 Proximity Card Time Clock Designed for Small to Large sized Businesses Large Color LCD Display Plug n
More informationBiometrics Unique, simple, convenient
Biometrics Unique, simple, convenient Biometrics Unique personal identification.. Simply place your finger on the sensor - job done! As convenient as it gets. 2 Why biometrics? Your benefits at a glance
More information3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company
3M Cogent, Inc. White Paper Beyond Wiegand: Access Control in the 21st Century a 3M Company Unprecedented security features & capabilities Why Wiegand? The Problem with Wiegand In 1970, John Wiegand invented
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationSecurity in the smart grid
Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable
More informationHere are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.
Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit
More informationDental Radiography Core Subject. Digital Radiography
Dental Radiography Core Subject Digital Radiography Aims: To develop an understanding of the history of digital radiography, the different types of digital x-rays and the advantages and disadvantages of
More informationMore effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
More informationTouch Screen Technology. Taking apart a tablet
Touch Screen Technology Topics covered: 1) Resistance, Capacitance, Charge, Voltage, and Current 2) Introduction to simple circuits Taking apart a tablet For example, an ipad2 Touchscreen Motherboard Lots
More informationWireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
More informationIIABSC 2015 - Spring Conference
IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber
More informationProf. Dr. M. H. Assal
Prof. Dr. M. H. Assal AS 26/10/2014 Computer hardware is the collection of physical elements that comprise a computer system Computer hardware can be classified as following: o Input devices o Output devices
More informationPROTECT YOUR FINANCIAL TRANSACTIONS
PROTECT YOUR FINANCIAL TRANSACTIONS Caisses populaires acadiennes www.acadie.com/en It s a wealth of ways to strengthen the security of your financial transactions. By implementing simple measures to mitigate
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationHIPAA SECURITY RULES FOR IT: WHAT ARE THEY?
HIPAA SECURITY RULES FOR IT: WHAT ARE THEY? HIPAA is a huge piece of legislation. Only a small portion of it applies to IT providers in healthcare; mostly the Security Rule. The HIPAA Security Rule outlines
More informationSecurity Defense Strategy Basics
Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and
More informationDesktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
More informationHost-based Protection for ATM's
SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................
More informationTime Clocks for Employee Attendance Tracking. Attendance on Demand, Inc. Farmington Hills, MI
Time Clocks for Employee Attendance Tracking Attendance on Demand, Inc. Farmington Hills, MI Time clocks record employee attendance information including start, end, and lunch break times. This information
More informationTranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have"
Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have" DIGIPASS Embedded Solutions White Paper DIGIPASS Embedded Solutions White Paper Page 1 of 14 2009 VASCO Data
More informationTHE BASICS OF PLL FREQUENCY SYNTHESIS
Supplementary Reading for 27 - Oscillators Ron Bertrand VK2DQ http://www.radioelectronicschool.com THE BASICS OF PLL FREQUENCY SYNTHESIS The phase locked loop (PLL) method of frequency synthesis is now
More informationXYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
More informationSecured Employee Attendance Management System Using Fingerprint
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. III (Jan. 2014), PP 32-37 Secured Employee Attendance Management System Using Fingerprint Chiwa,
More informationHIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
More informationParts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved
Parts of a Computer Preparation Grade Level: 4-9 Group Size: 20-30 Time: 75-90 Minutes Presenters: 1-3 Objectives This lesson will enable students to: Identify parts of a computer Categorize parts of a
More informationInternet and Computing Core Certification Guide Module A Computing Fundamentals
Lesson 4: Using Input/Output Devices input/output devices common input devices common output devices specialized devices how a device connects what a port is what a device driver is What are Input/Output
More informationSecurityMetrics Vision whitepaper
SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,
More informationwhat operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored?
Inside the CPU how does the CPU work? what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored? some short, boring programs to illustrate the
More informationToken Security or Just Token Security? A Vanson Bourne report for Entrust
Token Security or Just Token Security? A Vanson Bourne report for Entrust Foreword In 2011, Entrust Inc., an identity-based security company, partnered with respected technology research firm Vanson Bourne
More informationPersonal Identification Techniques Based on Operational Habit of Cellular Phone
Proceedings of the International Multiconference on Computer Science and Information Technology pp. 459 465 ISSN 1896-7094 c 2006 PIPS Personal Identification Techniques Based on Operational Habit of Cellular
More informationFORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY
FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY Page 1 of 6 Summary The Payment Card Industry Data Security Standard (PCI DSS), a set of comprehensive requirements for enhancing payment account
More informationW.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
More informationTableau for Robotics: Collecting Data
Tableau for Robotics: Collecting Data WHY WE COLLECT DATA Collecting data is core to any scouting strategy - without properly collecting data, there is no way to get insights from your scouting work. This
More informationKaspersky Lab s Full Disk Encryption Technology
Kaspersky Lab s Full Disk Encryption Technology In the US alone, an estimated 12,000 laptops are lost or stolen each week. According to the Ponemon Institute, a laptop is stolen every 53 seconds; more
More informationYALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is
More informationPalmSecureID for the EDUCATION MARKETPLACE
PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings
More informationTwo-Factor Authentication Making Sense of all the Options
Two-Factor Authentication Making Sense of all the Options The electronic age we live in is under attack by information outlaws who love profiting from the good record of others. Now more than ever, organizations
More informationTarget Security Breach
Target Security Breach Lessons Learned for Retailers and Consumers 2014 Pointe Solutions, Inc. PO Box 41, Exton, PA 19341 USA +1 610 524 1230 Background In the aftermath of the Target breach that affected
More informationIntrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
More informationDigitalPersona, Inc. Creating the authentication infrastructure for a digital world.
DigitalPersona, Inc. Creating the authentication infrastructure for a digital world. Rising Security Needs Secure Access Control is Critical Users Access Security Information Engineering, Intellectual
More informationToday. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
More informationAccessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: miniagarwal21@gmail.com [1], lavesh_1071985@yahoo.com
More informationFingerprint Enrollment Procedures
Fingerprint Enrollment Procedures 1 Version 1.1 December 1, 2003 Last Update April 1, 2004 COPYRIGHT Copyright 2003 Ringdale. All rights reserved. No part of this publication may be reproduced, transmitted,
More informationSecuGen USB Fingerprint Reader User Guide
SecuGen USB Fingerprint Reader User Guide Installation, Usage, Care and Troubleshooting SG1-0007B-017 (01/14) Copyright 1998-2014 SecuGen Corporation. ALL RIGHTS RESERVED. Specifications are subject to
More informationThe computer's internal components
Computer hardware and types of computer A brief introduction to the insides of a computer and its added hardware. This will help explain what a computer is from a hardware point of view, how we control
More informationWhy you MUST protect your customer data
Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are
More informationCYBER SECURITY POLICY For Managers of Drinking Water Systems
CYBER SECURITY POLICY For Managers of Drinking Water Systems Excerpt from Cyber Security Assessment and Recommended Approach, Final Report STATE OF DELAWARE DRINKING WATER SYSTEMS February 206 Kash Srinivasan
More informationP R O G R E S S I V E S O L U T I O N S
PCI DSS: PCI DSS is a set of technical and operational mandates designed to ensure that all organizations that process, store or transmit credit card information maintain a secure environment and safeguard
More informationIt s All About Authentication
It s All About Authentication An information security white paper to help focus resources where they produce the best results. March 2005 Author: Doug Graham, CISSP Senior Director Blue Ridge Networks,
More informationSharpen your document and data security HP Security solutions for imaging and printing
Sharpen your document and data security HP Security solutions for imaging and printing Recognize hidden risks You know how valuable data is to your organization. But the more data you acquire and share,
More informationEnterprise Biometric Security
N CYCLES software solutions Enterprise Biometric A framework for using biometric security in the enterprise. January 2003 Hunter Purnell Dan Marks 65 Germantown Court Suite 205 Cordova, TN 38125 Phone
More informationL-1 Fingerprint Reader Solutions. V-Flex 4G
L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in
More informationADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
More informationBIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY 1 BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY INCREASES
BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY 1 BIOMETRICS IMPLEMENTING INTO THE HEALTHCARE INDUSTRY INCREASES THE SECURITY FOR THE DOCTORS, NURSES, AND PATIENTS By: Darrell Shawl THESIS FOR MASTERS
More information