...and individuals. Many companies have been compromised and personal information obtained and used without authorization. It is very important to have computer and network security to keep hackers and malware from collecting data and destroying a computer system and network. Computer security protects all of the data that is stored on your computer. Every component should be protected that includes hardware, software, and data. The history of Network security started when hacking crimes started in the 1980’s. Robert Morris was a computer hacker that released a worm that affected 6,000 computer systems. It created a large monetary financial lost because of a computer worm. The Computer Emergency Response Team (CERT) was said to be form after the attack to inform users they had security problems. ”The Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) leads efforts to improve the Nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the Nation while protecting the constitutional rights of Americans (US-CERT).” Hospitals have major concern in protecting computer and network security. The information in hospitals have very valuable information such as patient records, social security number and payment information. All of which is harmful if it gets into the incorrect hands...
Words: 1025 - Pages: 5
...Communication and Information Technologies Tutor Marked Assignment Dynamic Holiday Limited Biometric Authentication Report Introduction This report aims to give a brief overview of the alternatives to the current authentication system being used at Dynamic Holidays Limited. Specifically it will detail the technologies behind both fingerprint and iris scanning, doing a comparison of each in turn, and then ultimately leading to a recommendation as to which would suit the company better. Biometric Overview Biometrics, or the singular biometric, is the measurement of living things and in most contexts details the measurement of human beings for security and authentication purposes. This stems from the Greek bios (life) and metron (measure). In a security environment, biometrics are utilised to ensure that the correct people have access to the products and services to which they are entitled. The field of biometrics covers a wide scope of technologies, including but not limited to facial, iris, fingerprint and DNA recognition. Within the field of biometrics, there are generally two sources of identification classifications: physiological and behavioural. Physiological characteristics are those that we are born with and do not usually change (iris and fingerprints), especially once we have reached adulthood. This excludes the nature of physical injury or various other medical or traumatic...
Words: 3039 - Pages: 13
...| Biometric Identification Technology | | By Group C: | HUMN432 | 6/10/2012 | | Table of Contents Introduction History of Biometric Identification Biometric Identification Advancement Timeline * Types of Biometric Identification Technologies and How They Work Benefits of Biometric Identification Technology How and Where Biometry is Used In the USA Controversial Issues and Legalities of Biometric Identification Conclusion Bibliography Introduction Biometric Identification Technology is the world-wide used computer science that identifies humans based on physiological and behavioral traits for access control and security. The computer processing idea has been around for hundreds of years but the equipment has only been available for the past several decades evolving to become better with each step. The need for a formal system to record and identify first-time and repeated offenders in the 1800s led the known Bertillon to develop anthropometrics to identify individuals. This advancement was later linked with computer systems to create a true biometric system identifier. The several types of biometric identifiers, later discussed, have evolved from a mere idea to an implemented security system used in airports, government programs, and even small businesses. The technology is used globally from the US to the UK, India, Germany, and many more. Its long history has created responsiveness and allowed countries to embrace the welfares of such a...
Words: 7486 - Pages: 30
... INTRODUCTION BACKGROUND OF STUDY In years past, when enterprises were starting, it suffered data lose and information retrieval was difficult since there was no strong security service to protect already gathered information. Production, distribution and some other functions were very difficult to achieve due to weak security services but as the days passed by enterprise has struggled to secure its services and with the aid of growth in technology and programming enterprise services has reached a reasonable degree in achieving its dream by protecting its services from harm. An enterprise is an activity or a project that produces services or products. There are essentially two types of enterprise, business and social enterprises. Business enterprises are run to make profit for a private individual or group of individuals. This includes small business while social enterprise functions to provide services to individuals and groups in the community. These shows that an enterprise security service is a form of protecting the services or the product of individuals and groups in the community from harm (preventing unauthorized users from gaining access). Enterprise now uses Biometric, Encryption and some others forms of security to form the backbone of its services. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics...
Words: 4428 - Pages: 18
...Promising Technology vs. Intrusion on Personal Privacy Thomas L. Wilson University of Maryland University College: HMLS 312 Professor Steven Woodall 06 September 2014 Term Paper Security vs. Privacy Executive and legislative measures implemented to strengthen the security of the United States and territories within directly contributed to an increase in privacy concerns following the 9/11 terrorist attacks in the United States and ignited debate, discussion, and study regarding balancing security and privacy thereafter. (Parker, 2004) I am concerned whether or not citizens of the United States will have to forfeit a significant amount of privacy due to intelligence gathering against terrorist activity directed at this country. In my mind, this cannot be answered directed, tucked away and blindly followed. Every step and implementation of new procedures and technologies in direct support of intelligence gathering and identification of terrorist suspects must be debated and understood before going forwarded to ensure due process for privacy concerns. They may have to be an understanding or “give-and-take. (Jenkins, 2012) Many of our security vs. privacy concerns stem from processes implemented after 9/11 for ensuring the United States was more prepared to detect and combat terrorist activities. Of course immediately after, many disagreed and argued that a balance between states security and civil liberty has to be maintained. Additionally, there was (and still is)...
Words: 1231 - Pages: 5
...protection of private information continues to reach new levels. New approaches to prevent crimes such as identity theft and other cyber crimes are constantly being explored. One of the approaches being explored is biometrics. According to the Merriam-Webster dictionary, biometrics is “the measurement and analysis of unique physical or behavioral characteristics (as fingerprint or voice patterns) especially as a means of verifying personal identity” (2013). Biometrics can play an important role in identifying individuals and protecting information. However, privacy concerns are raised by advocates that argue people’s privacy will be violated as well other concerns regarding privacy and security. Biometric systems have not reached their full potential and new purposes for these systems continue to be explored and implemented. Banks all over the world are installing security systems that require some form of personal identification trait such as voice recognition on ATMs. Not only for security, biometrics is being used for a variety of different reasons that range from banking to gaming. In gaming, the Xbox One that was recently launched included an improved version of their Kinect motion-sensing device that will also be able to recognize facial features and identify individuals. Overall, the future of biometrics in technology appears to be taking great steps in becoming integrated in our everyday lives. One of the most important reasons to explore biometric security is to...
Words: 1046 - Pages: 5
...Personally Identifiable Information (PII) and Data Breaches By Stevie D. Diggs University Maryland University College IFSM201 Section 7974 Semester 1309 Personally Identifiable Information (PII) and Data Breaches Knowing and training on personally identifiable information (PII) is important in today’s society. There has been research on data breaches and identity theft that links them both together. This is to help personnel have a clear understanding on the impact of what is at steak and an explanation of PII. Many businesses and organizations have different definition for PII because of the classification of data for each, and that is why understanding PII is important. Examples of PII include, but are not limited to the following: full name, maiden name, mother‘s maiden name, or alias; personal identification number, social security number (SSN), passport number, driver‘s license number, taxpayer identification number, or financial account or credit card number; address information, street address or email address; personal characteristics, including photographic image, fingerprints, handwriting, or other biometric data. How do you protect PII? Who has access to PII? Who are affected by data breaches and identity theft? How to prevent data breaches and identity theft? The research introduced in this essay is from Verizon along with multiple articles involving military and organizations. PII is defined definitely by military and organizations. Training along with knowing...
Words: 1541 - Pages: 7
...ACCESS CONTROL IN SUPPORT OF INFORMATION SYSTEMS SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 2, Release 2 26 DECEMBER 2008 Developed by DISA for the DoD UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD This page is intentionally blank. ii UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD TABLE OF CONTENTS Page SUMMARY OF CHANGES...................................................................................................... IX 1. INTRODUCTION................................................................................................................. 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 2. Background ..................................................................................................................... 1 Authority ......................................................................................................................... 2 Scope............................................................................................................................... 3 Writing Conventions....................................................................................................... 3 Vulnerability Severity Code Definitions ........................................................................ 4 STIG Distribution .......
Words: 38488 - Pages: 154
...is to be proactive and deny hostile people the opportunity to attack. Biometrics has given security personnel the ability to accurately identify people. Because of this, government agencies are rapidly increasing the use of biometrics. Biometrics is the measurement and analysis of unique physical characteristics especially as a means of verifying personal identity (Biometrics - Definition). An ideal biometric trait should be universal (all people possess the trait), unique (no two people share the exact same trait), permanent (the trait cannot be changed or altered), and collectable (the trait is able to be read by a sensor and is easily verified) (Jain 92). The most common physical characteristics that are used are fingerprint recognition, hand geometry recognition, and iris recognition (Das 3). Fingerprint recognition involves mapping the various ridges and valleys that form the skin design of a fingerprint (Das 3). Hand geometry recognition deals with creating a three dimensional image of unique features that form the structure of a hand (Das 3). Iris recognition entails examining the unique features of the iris, namely the trabecular meshwork and physiological properties such as freckles, furrows, rings, and the corona (Das 3). All of these characteristics can be digitized and loaded onto a network to form a biometric database. From this database, a biometric system is formed. A biometric system is a pattern recognition system that recognizes a user by determining...
Words: 1207 - Pages: 5
...free people. It offers a technical guarantee of privacy, regardless of who is running the government. It's hard to think of a more powerful, less dangerous tool for liberty. To explain this interesting statement, it is important to define the term Encryption. “Encryption is the conversion of a message or data file into a form that cannot be understood by unauthorized readers.” (Dyson) Encryption can be thought as locking something valuable into a strong box with a key. Sensitive data is encrypted by using a key algorithm, which renders it unreadable without the knowledge of the key. Data encryption keys are determined at connect time between a connection and the computer on the other end. The use of data encryption can be initiated by a personal computer or by the server it’s connecting to. On these terms, “Encryption is the technology that makes E-COMMERCE possible because it underlies the security systems used to protect electronic financial transactions.” (Dyson) Similarly, Dan Boneh, Professor of Computer Science and Electrical Engineering at Stanford University, gives another definition for the term. “Encryption is a method for users to securely share data over an insecure network or storage server.” (Boneh, Sahai and Waters) Since there are many transactions people do every day such as online banking or online shopping, it is necessary to make sure that they are done safely with the use of Encryption. As a matter of fact, the applications of encryption are very important...
Words: 1201 - Pages: 5
...Understanding The Concept of Protecting Personal Information (PPI) IFSM 201 6381 Concepts and Applications of Information Technology (2158) University of Maryland University College Understanding The Concept of Protecting Personal Information (PPI). Personally Identifiable Information or PII is information that can be used to distinctively identify, contact, or locate an individual. PPI is sensitive information that is associated with a person. These information should be accessed only on a strict need-to-know basis and handled and stored with great care. Personally identifiable information is information that can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc., alone, or when combined with secondary personal or secondary identifying information that is linked or linkable to a specific individual, such as date and place of birth, mother's maiden name, etc. Most companies keep sensitive personal information in their hard copy files such as names, addresses, gender, social security numbers, credit card, or other account data that uniquely identifies customers or employees (Heller, 2001, p. 1). This information is often necessary to complete customers’ orders, meet payroll, or perform other important business functions. However, if sensitive information gets into the wrong people, there is every tendency that it can lead...
Words: 942 - Pages: 4
...Protect Your Information Personally identifiable information or PII defined by Department of Commerce as “Information which can be used to distinguish or trace an individual's identity, such as their name, social security number, biometric records, etc. alone, or when combined with other personal or identifying information which is linked or linkable to a specific individual, such as date and place of birth, mother’s maiden name, etc. (OMB Memorandum M-07-16, Note 1). The definition of PII is very broad and makes no distinction between “sensitive” and “non-sensitive” PII. Terms not specifically defined within this Memorandum (e.g., sensitive) should be considered to reflect the definition found in a commonly accepted dictionary. (OMB Memorandum M-07-16, Note 7). Examples include direct references such as name, address, social security number, and e-mail address. It also includes any information that could be used to reference other data elements that are used for identification, such as gender, race, and date of birth.” This has been around for a very long time, it can cover many topics for example employee monitoring, information privacy, (the biggest) identity theft, etc. Every single topic mentioned go hand and hand in a general converstion of PII. I wonder from time to time where does my information go, who hands it in, are they responsible, how can I trust that anonymous person? These questions can go on forever and ever but, I can worry less about my information now it is...
Words: 978 - Pages: 4
...increase their defenses against threats to national security. One of these new measures is the biometric passport, which has grown out of the necessity to overcome the misuse of paper travel documents. Some of the problems that have been encountered with the use of paper passports are copying and manipulation, selling of valid passports to a third party, and counterfeit or forged passports. Due to the difficulty of discerning a real passport from a fake, agents must undergo extensive training that still does not adequately protect against these threats. One of the initial attempts to increase border security by more accurately verifying identity and preventing counterfeit passports was the introduction of e-passports, or electronic passports. E-passports are identical to paper passports with the addition of an embedded, contactless smart-card containing the same information as the visual passport, including a digital version of the photograph. The contactless smart card is a tiny microprocessor that transmits information wirelessly utilizing RFID technology over distances of less than four inches. These smart-cards utilize advanced security mechanisms to prevent alterations to the embedded data. Unfortunately, these attempts did not prevent passport abuse. In response to persistent passport fraud, biometric technologies have been employed as an additional security measure. Biometric technology is an automated mechanism that verifies or identifies an individual based on physiological...
Words: 1617 - Pages: 7
...In the past few years, businesses have been using modern technology to make processes more innovative and to help compete with other businesses in parallel industries. Our grandfather owned the Broadway Café, a local coffee shop, since the early 1950s. Having just inherited this coffee shop, we realized how out of date the café was in terms of information technology. To help us determine our café’s position and what changes must be made, we first implemented Porter’s Five Forces model to our café and then chose to use the differentiation strategy to rebuild our café for the 21st century. The first force, buyer power, we recognized to be fairly strong. Buyer power is strong because there are a number of coffee shops located in the East Lansing area as well as ours. In order to overcome competitive challenges, we came up with ways to set ourselves apart from our competitors. We plan to create a unique, tech-savvy atmosphere compared to other coffee shops in downtown East Lansing, giving the Broadway Café the competitive advantage. We will set ourselves apart from these competitors by establishing and maintaining customer relationships through a customer loyalty program that will be rewarded to frequent customers. These strategies will be used, as well as others, to minimize the overwhelming buyer power of our customers. Next, supplier power, another one of Porter’s Five Forces, we have recognized as weak compared to other forces. Our suppliers of coffee beans have a low bargaining...
Words: 4177 - Pages: 17
...Biometric Authentication System for Information Security Objective To explain about biometric system that can be used by the organization. By understand the biometric differences; organization can decide which technique is the most suitable for the business. Methodology The method used to know about biometric is scientific literature which will develop quantitative identification as the measurement for the authentication. Outcome To give better understanding about biometric system, biometric techniques as well as the advantages and disadvantages of biometric use in organization. Conclusion Organization can understand better value of biometric system and what is needed to implement the biometric system into the company. Keywords Biometrics CHAPTER I INTRODUCTION 1.1 Background Since January 2008, the technology had developed rapidly causing the world advancing towards a new era. A survey on 2008 had estimated about 541.7 million computers are connected in more than 250 countries on every continent even Antarctica. The internet is not a single network but it is a worldwide network that connected every individual computer hosts to network connection, in a variety ways. Thus, individuals and organizations can reach the internet without regard to national or geographic boundaries or time of day. However, along with the advantages and easy access to get information, there are also many risks such as the valuable information will be lost, stolen, changed or misused...
Words: 5215 - Pages: 21