• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Biometrics: Analysis and Implications.

Extracts from this document...


Biometrics: Analysis and Implications Criterion A: Describing the Issue Throughout history, people have used different systems of identity verification, ranging from visual body characteristics, or simple facial qualities. However, Biometrics provide a new field of advanced identity verification, as it grants techniques from the popular fingerprint, to the accurate iris and the interesting retina scanning. It has been recorded that even in antique times, people have used biometric identity verification to enhance duties (e.g., administration and provision of food)2. Biometrics have the ability to positively identify or authenticate an individual, thereby preventing a host of identity-related fraud issues, especially of concern now in an increasingly on-line world. But biometrics also have the ability to track individuals and their transactions, and to be used as a universal identifier which can associate or link various sources of personal information to an individual -- in either case, without their consent3. ATM's with the ability to discern emotions have been built, but as easily, databases can be built to collect the emotional state of people, and sell that information to third- party companies1. ...read more.


However, new forms of biometric like voice verification and signature verification take another approach using waveform and a number of unprecedented methodologies Criterion C: Analysing the Impact of the Issue A biometric such as a fingerprint can be used as a unique surrogate of one's identity which, as a unique identifier, can be used to trace people's transactions and link massive amounts of personal data about them. If my fingerprints are stored in a database, then my transactions, whereabouts and personal information can easily be tracked. It does not really matter for what purpose the biometric information was assembled -- whether it was for welfare registration or bank machine access, the same point applies. If someone happens to be on welfare and innocently leave his latent fingerprints at a night club which later becomes the scene of a crime, any latent prints of his picked up could be matched to the fingerprint database compiled for welfare recipients. ...read more.


The protection mechanism must not depend on the ignorance of potential attackers. The mechanism should be open to public scrutiny, just as cryptographic algorithms are subjected to. A step in the right direction is to encrypt the digital templates stored in the database. These encrypted biometrics improve privacy protection since matching efforts could not be accomplished without access to the encryption key. In this case, essential management would be the weak link. Who is going to have control over the encryption keys? With essential management, as with key escrow in a security system, privacy is based on a trust model. Criterion E: Selecting and Using Sources 1Mercer, Brandon. "Can Computers Read Your Mind?." TechTV 10/28/02. News. <http://www.techtv.com/news/computing/story/0,24195,3386341,00.html>. 2Ashbourn, Julian. Biometrics: Advanced Identity Verification. Great Britain: Springer-Verlag London Limited, 2000. 3N/A. "Biometric Identifiers." Biometrics. 08/07/02. Electronic Privacy Information Center. <http://www.epic.org/privacy/biometrics/default.html>. --------------------------------------------------------------------- Walker, Steven M.. "Biometric Selection: Body Parts Online." SANS Institute 07/26/02. Security Awareness. <http://www.sans.org/rr/authentic/parts_online.php>. Tomko, George. Biometrics as a Privacy-Enhancing Technology: Friend or Foe of Privacy?. 09/15/98. <http://www.dss.state.ct.us/digital/tomko.htm>. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Management & Manipulation of Information section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Management & Manipulation of Information essays

  1. Marked by a teacher

    Hardware and Network issues in e-commerce

    5 star(s)

    bandwidth, high speed and an always on connection will only be a catalyst to this trend and due to this always on feature, internet traffic can last for hours. (Krueger, 2001). The Future of broadband The advent of broadband has been heralded as big leap in communications technology.

  2. Everything about Digital Divide

    When children have access to this type of tool they get engaged in their own education. They learn, share, create, and collaborate. They become connected to each other, to the world and to a brighter future." This is a non-profit association, which means that their aim is to fulfil their mission rather than making money with this.

  1. Designing a booking system for an Estate Agent.

    This is something that the old system is not able to do as it was an unorganised paper based system. The new system will be using a form based systems that is operated by clicking buttons which is similar as if they were shopping online.

  2. Database Design

    I simply type in a number first in the postcode section but it wouldn't allow me to type anything because it is invalid. This proves that it will not allow an invalid postcode to be written. User Guide Firstly you must open the database.

  1. The purpose of this document is to provide a design for an electronic payment ...

    User, Shopping Basket, Payment MySQL Database 3 Dependency Descriptions 3.1 Inter-module Dependencies 3.1.1 Use Case Diagram of the Payment System The purpose of this section is to show the main activities of the users in this payment system. Figure 6 describes the actor functionality and shows the two actions users will employ when buying images.

  2. Background and investigation for designing a database for a DVD rental shop.

    tasks being performed by staff * The frequency at which these tasks are performed * The interactions between the different staff members * The flow of information in the system and the efficiency of this flow General Findings from interview and direct observation JenJams currently has three members of staff, consisting of the manager, and floor staff.

  1. Free essay

    Data Protection

    * In most cases some spyware make changes to your computer that can be annoying and can cause your computer slow down or crash. Preventing Spyware * To help prevent spyware, you should do the following things: Use a firewall: A small amount of spyware can actually be placed on your computer remotely by hackers.

  2. ICT Security Report

    That has been illegally introduced. Viruses can spread from one computer to another when information from the infected computer is taken to an uninfected computer. This can be done through the internet via downloads and emails, or even by carrying it on a removable hard-drive tool such as a floppy disk, CD or USB drive.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work