Van Tassel 1           Jeff Van Tassel              CAP480           Mrs. McCarthy               3/6/13Biometric Devices i...
Van Tassel 2   For my project I am going to discuss the flaws that exist in biometric devices. This paper isintended to ma...
Van Tassel 3   The intended audience for my paper is my classmates and my teacher, network professionals,and anybody else ...
Van Tassel 4ways that biometrics can be compromised. It also gives me different problems with other factorsof identificati...
Van Tassel 5                                             References    Biometrics – problem or solution ?. (n.d.). Retriev...
Upcoming SlideShare
Loading in …5
×

Project proposal

386 views

Published on

The project proposal that i did for my arts and science capstone class.

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
386
On SlideShare
0
From Embeds
0
Number of Embeds
92
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Project proposal

  1. 1. Van Tassel 1 Jeff Van Tassel CAP480 Mrs. McCarthy 3/6/13Biometric Devices in Network Security
  2. 2. Van Tassel 2 For my project I am going to discuss the flaws that exist in biometric devices. This paper isintended to make people aware of the flaws that exist with using biometric devices. As a result ofreading this paper I would like for people to be able to realize the security risk associated withthe using of these devices and to consider the possible risk they will pose to the network that theyare used in. This will help administrators be able to use them in a way that will not provide andsecurity flaws to their network. The problem with biometrics is that they are not always accurate. “Sources of potential errorcreate two measuring levels that biometrics build in to their calculations: false acceptance andfalse rejection. As these figures imply, the measurement system is set up to allow for errors.Therefore you have to understand that the operation of the system can be „tuned‟ to be more orless precise.” ("Biometrics – problem," ). Biometrics can give you access when you should haveand deny you access when you should be able to get in. There are also many instances of peoplefooling various biometric devices. My proposed solution is to use biometric devices along withother forms of identifications. The tasks or actions needed to solve the problem are to implement multiple forms ofidentification to offset the chance of an unwanted person logging into the system. The use ofmultiple forms of identification will make it more challenging for someone to get into thesystem. This is because if they obtain a person‟s identification card they will also have to knowor guess their password and fool the biometric device. Multi layer access such as this willprovide a more secure network for companies.
  3. 3. Van Tassel 3 The intended audience for my paper is my classmates and my teacher, network professionals,and anybody else that is interested in biometrics and/or security flaws. It is intended for thembecause it is projects for class and my teacher will have to grade and my classmates will have topeer review it. It is also for professionals that would like to know about some of the securityflaws that biometric devices have and can cause a network that they are implemented in. Somebackground on the audience‟s place in this argument is that the professionals are the ones thathave to use the equipment in their networks and the teacher and the classmates are the ones thathave to review my work. I am not sure what position that my audience is in. The audience can be in many differentpositions. They could already know that the biometric devices have some flaws in their designand want to know more about the flaws. The audience could be skeptic that the biometric devicescan be flawed and defeated. The proposed research that I plan to do is find out the vulnerabilities in the devices and howthey can be fooled and the ways to solve the weakness that they bring to a computer network.This paper will help companies decide whether or not they should be used and how best toimplement them in their networks. The research that I have already used shows some of the flaws of biometric devices. Theother sources that I have found show more problems in biometrics along with problems moreinformation on how biometric devices work. Future research is implementing biometrics withother identification ways and ways biometrics can be fooled. Some of the other references that Ihave found are: http://searchsecurity.techtarget.com/tip/Problems-with-authentication andhttp://www.strassmann.com/pubs/searchsecurity/2002-4.php this reference will give me different
  4. 4. Van Tassel 4ways that biometrics can be compromised. It also gives me different problems with other factorsof identification, I know it is not what would be considered current but it does have a lot of goodinformation.; https://www.eff.org/wp/biometrics-whos-watching-you. This article gives me moreinformation on different types of biometrics and how they are used and fooled. Again, I knowthat it is a bit dated but it does have good information.http://www.articsoft.com/whitepapers/biometrics.pdf. This site also gives me information onhow biometrics work and some faults with them.; and http://www.biometrics.dod.mil/. This sitegives me a lot of information on how biometrics work and how they can be compromised.
  5. 5. Van Tassel 5 References Biometrics – problem or solution ?. (n.d.). Retrieved fromhttp://www.articsoft.com/whitepapers/biometrics.pdf

×