• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Biometrics: Analysis and Implications.

Extracts from this document...


Biometrics: Analysis and Implications Criterion A: Describing the Issue Throughout history, people have used different systems of identity verification, ranging from visual body characteristics, or simple facial qualities. However, Biometrics provide a new field of advanced identity verification, as it grants techniques from the popular fingerprint, to the accurate iris and the interesting retina scanning. It has been recorded that even in antique times, people have used biometric identity verification to enhance duties (e.g., administration and provision of food)2. Biometrics have the ability to positively identify or authenticate an individual, thereby preventing a host of identity-related fraud issues, especially of concern now in an increasingly on-line world. But biometrics also have the ability to track individuals and their transactions, and to be used as a universal identifier which can associate or link various sources of personal information to an individual -- in either case, without their consent3. ATM's with the ability to discern emotions have been built, but as easily, databases can be built to collect the emotional state of people, and sell that information to third- party companies1. ...read more.


However, new forms of biometric like voice verification and signature verification take another approach using waveform and a number of unprecedented methodologies Criterion C: Analysing the Impact of the Issue A biometric such as a fingerprint can be used as a unique surrogate of one's identity which, as a unique identifier, can be used to trace people's transactions and link massive amounts of personal data about them. If my fingerprints are stored in a database, then my transactions, whereabouts and personal information can easily be tracked. It does not really matter for what purpose the biometric information was assembled -- whether it was for welfare registration or bank machine access, the same point applies. If someone happens to be on welfare and innocently leave his latent fingerprints at a night club which later becomes the scene of a crime, any latent prints of his picked up could be matched to the fingerprint database compiled for welfare recipients. ...read more.


The protection mechanism must not depend on the ignorance of potential attackers. The mechanism should be open to public scrutiny, just as cryptographic algorithms are subjected to. A step in the right direction is to encrypt the digital templates stored in the database. These encrypted biometrics improve privacy protection since matching efforts could not be accomplished without access to the encryption key. In this case, essential management would be the weak link. Who is going to have control over the encryption keys? With essential management, as with key escrow in a security system, privacy is based on a trust model. Criterion E: Selecting and Using Sources 1Mercer, Brandon. "Can Computers Read Your Mind?." TechTV 10/28/02. News. <http://www.techtv.com/news/computing/story/0,24195,3386341,00.html>. 2Ashbourn, Julian. Biometrics: Advanced Identity Verification. Great Britain: Springer-Verlag London Limited, 2000. 3N/A. "Biometric Identifiers." Biometrics. 08/07/02. Electronic Privacy Information Center. <http://www.epic.org/privacy/biometrics/default.html>. --------------------------------------------------------------------- Walker, Steven M.. "Biometric Selection: Body Parts Online." SANS Institute 07/26/02. Security Awareness. <http://www.sans.org/rr/authentic/parts_online.php>. Tomko, George. Biometrics as a Privacy-Enhancing Technology: Friend or Foe of Privacy?. 09/15/98. <http://www.dss.state.ct.us/digital/tomko.htm>. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Marked by a teacher

    Hardware and Network issues in e-commerce

    5 star(s)

    The Waverider equipment, installed by North Rock not only takes about two days to install but also the connection is at a blistering 6 Mbps. This, when compared to ISDN's maximum of 128 Kbps and T1's 1.54 Mbps connections, wireless seems awfully fast (Cambridge, 2000).

  2. Everything about Digital Divide

    When children have access to this type of tool they get engaged in their own education. They learn, share, create, and collaborate. They become connected to each other, to the world and to a brighter future." This is a non-profit association, which means that their aim is to fulfil their mission rather than making money with this.

  1. Designing a booking system for an Estate Agent.

    Lastly, a data that will be needed is the information about the company cars. The company has 3 company cars. This way when booking an appointment the employee could decide on which company cars they would use for the visit.

  2. Background and investigation for designing a database for a DVD rental shop.

    Information that Ashley would like to be able to extract from the new system include an easy way to monitor and produce reports on the rental status of each DVD, as this will save time when a customer wants to make a rental.

  1. Video World Database as ICT project.

    Apply sub forms to main forms using wizards 01-03-01 12 Apply macros to database 03-03-01 13 Generate structure of reports 04-03-01 14 Finalise structure of sub menus to point to data input menu, report menu and rental menu 06-03-01 15 Perform testing plan using extended data 08-03-01 16 Analyse results

  2. ICT Security Report

    Trojans are malicious software. These programs devised by professional hackers to detect activity on PC allowing the hacker to assume the user's identity. This is done because they carry codes that are not acknowledged for the purposed stated. Hackers are then able to run programs on the user's computer without them knowing.

  1. A relative of mine works for a corporate firm on CRM (Customer Relationship Management) ...

    * Accessibility and processing requirements : Dyche (2002) suggests that the new software should be able to handle enough data as per the needs of company. It should be able to pose limitations to the non company users. The decision maker has to check the transaction limitations, password encryption techniques.

  2. ICT Solutions for people with Special Needs.

    However, I will choose to distinguish Dyslexic users as people with learning difficulties. I will include both my other users to be included under the definition of a disability.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work