SlideShare une entreprise Scribd logo
1  sur  5
Van Tassel 1




           Jeff Van Tassel

              CAP480

           Mrs. McCarthy

               3/6/13

Biometric Devices in Network Security
Van Tassel 2




   For my project I am going to discuss the flaws that exist in biometric devices. This paper is

intended to make people aware of the flaws that exist with using biometric devices. As a result of

reading this paper I would like for people to be able to realize the security risk associated with

the using of these devices and to consider the possible risk they will pose to the network that they

are used in. This will help administrators be able to use them in a way that will not provide and

security flaws to their network.


   The problem with biometrics is that they are not always accurate. “Sources of potential error

create two measuring levels that biometrics build in to their calculations: false acceptance and

false rejection. As these figures imply, the measurement system is set up to allow for errors.

Therefore you have to understand that the operation of the system can be „tuned‟ to be more or

less precise.” ("Biometrics – problem," ). Biometrics can give you access when you should have

and deny you access when you should be able to get in. There are also many instances of people

fooling various biometric devices. My proposed solution is to use biometric devices along with

other forms of identifications.


       The tasks or actions needed to solve the problem are to implement multiple forms of

identification to offset the chance of an unwanted person logging into the system. The use of

multiple forms of identification will make it more challenging for someone to get into the

system. This is because if they obtain a person‟s identification card they will also have to know

or guess their password and fool the biometric device. Multi layer access such as this will

provide a more secure network for companies.
Van Tassel 3


   The intended audience for my paper is my classmates and my teacher, network professionals,

and anybody else that is interested in biometrics and/or security flaws. It is intended for them

because it is projects for class and my teacher will have to grade and my classmates will have to

peer review it. It is also for professionals that would like to know about some of the security

flaws that biometric devices have and can cause a network that they are implemented in. Some

background on the audience‟s place in this argument is that the professionals are the ones that

have to use the equipment in their networks and the teacher and the classmates are the ones that

have to review my work.


   I am not sure what position that my audience is in. The audience can be in many different

positions. They could already know that the biometric devices have some flaws in their design

and want to know more about the flaws. The audience could be skeptic that the biometric devices

can be flawed and defeated.


   The proposed research that I plan to do is find out the vulnerabilities in the devices and how

they can be fooled and the ways to solve the weakness that they bring to a computer network.

This paper will help companies decide whether or not they should be used and how best to

implement them in their networks.


   The research that I have already used shows some of the flaws of biometric devices. The

other sources that I have found show more problems in biometrics along with problems more

information on how biometric devices work. Future research is implementing biometrics with

other identification ways and ways biometrics can be fooled. Some of the other references that I

have found are: http://searchsecurity.techtarget.com/tip/Problems-with-authentication and

http://www.strassmann.com/pubs/searchsecurity/2002-4.php this reference will give me different
Van Tassel 4


ways that biometrics can be compromised. It also gives me different problems with other factors

of identification, I know it is not what would be considered current but it does have a lot of good

information.; https://www.eff.org/wp/biometrics-whos-watching-you. This article gives me more

information on different types of biometrics and how they are used and fooled. Again, I know

that it is a bit dated but it does have good information.

http://www.articsoft.com/whitepapers/biometrics.pdf. This site also gives me information on

how biometrics work and some faults with them.; and http://www.biometrics.dod.mil/. This site

gives me a lot of information on how biometrics work and how they can be compromised.
Van Tassel 5




                                             References

    Biometrics – problem or solution ?. (n.d.). Retrieved from
http://www.articsoft.com/whitepapers/biometrics.pdf

Contenu connexe

Similaire à Project proposal

Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 

Similaire à Project proposal (20)

Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Essay Statement Of Purpose Sketsa. Online assignment writing service.
Essay Statement Of Purpose Sketsa. Online assignment writing service.Essay Statement Of Purpose Sketsa. Online assignment writing service.
Essay Statement Of Purpose Sketsa. Online assignment writing service.
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
 
Biometrics system penetration in mobile devices
Biometrics system penetration in mobile devicesBiometrics system penetration in mobile devices
Biometrics system penetration in mobile devices
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
IRJET- Disease Classification based on Symptoms using CHATBOT
IRJET- Disease Classification based on Symptoms using CHATBOTIRJET- Disease Classification based on Symptoms using CHATBOT
IRJET- Disease Classification based on Symptoms using CHATBOT
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.com
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
Irjet v7 i4693
Irjet v7 i4693Irjet v7 i4693
Irjet v7 i4693
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.com
 
social networking site
social networking sitesocial networking site
social networking site
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGY
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.com
 

Project proposal

  • 1. Van Tassel 1 Jeff Van Tassel CAP480 Mrs. McCarthy 3/6/13 Biometric Devices in Network Security
  • 2. Van Tassel 2 For my project I am going to discuss the flaws that exist in biometric devices. This paper is intended to make people aware of the flaws that exist with using biometric devices. As a result of reading this paper I would like for people to be able to realize the security risk associated with the using of these devices and to consider the possible risk they will pose to the network that they are used in. This will help administrators be able to use them in a way that will not provide and security flaws to their network. The problem with biometrics is that they are not always accurate. “Sources of potential error create two measuring levels that biometrics build in to their calculations: false acceptance and false rejection. As these figures imply, the measurement system is set up to allow for errors. Therefore you have to understand that the operation of the system can be „tuned‟ to be more or less precise.” ("Biometrics – problem," ). Biometrics can give you access when you should have and deny you access when you should be able to get in. There are also many instances of people fooling various biometric devices. My proposed solution is to use biometric devices along with other forms of identifications. The tasks or actions needed to solve the problem are to implement multiple forms of identification to offset the chance of an unwanted person logging into the system. The use of multiple forms of identification will make it more challenging for someone to get into the system. This is because if they obtain a person‟s identification card they will also have to know or guess their password and fool the biometric device. Multi layer access such as this will provide a more secure network for companies.
  • 3. Van Tassel 3 The intended audience for my paper is my classmates and my teacher, network professionals, and anybody else that is interested in biometrics and/or security flaws. It is intended for them because it is projects for class and my teacher will have to grade and my classmates will have to peer review it. It is also for professionals that would like to know about some of the security flaws that biometric devices have and can cause a network that they are implemented in. Some background on the audience‟s place in this argument is that the professionals are the ones that have to use the equipment in their networks and the teacher and the classmates are the ones that have to review my work. I am not sure what position that my audience is in. The audience can be in many different positions. They could already know that the biometric devices have some flaws in their design and want to know more about the flaws. The audience could be skeptic that the biometric devices can be flawed and defeated. The proposed research that I plan to do is find out the vulnerabilities in the devices and how they can be fooled and the ways to solve the weakness that they bring to a computer network. This paper will help companies decide whether or not they should be used and how best to implement them in their networks. The research that I have already used shows some of the flaws of biometric devices. The other sources that I have found show more problems in biometrics along with problems more information on how biometric devices work. Future research is implementing biometrics with other identification ways and ways biometrics can be fooled. Some of the other references that I have found are: http://searchsecurity.techtarget.com/tip/Problems-with-authentication and http://www.strassmann.com/pubs/searchsecurity/2002-4.php this reference will give me different
  • 4. Van Tassel 4 ways that biometrics can be compromised. It also gives me different problems with other factors of identification, I know it is not what would be considered current but it does have a lot of good information.; https://www.eff.org/wp/biometrics-whos-watching-you. This article gives me more information on different types of biometrics and how they are used and fooled. Again, I know that it is a bit dated but it does have good information. http://www.articsoft.com/whitepapers/biometrics.pdf. This site also gives me information on how biometrics work and some faults with them.; and http://www.biometrics.dod.mil/. This site gives me a lot of information on how biometrics work and how they can be compromised.
  • 5. Van Tassel 5 References Biometrics – problem or solution ?. (n.d.). Retrieved from http://www.articsoft.com/whitepapers/biometrics.pdf