Page 86 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 86

Information  Security and Privacy




                    Notes          concerned in the organizations, need to come to an agreement that biometrics should be deployed
                                   for the protection of organizational assets. Also consider the social sigma factor mentioned as
                                   well as the lack of awareness; fingerprinting is a chiefly sensitive topic, given that it is linked
                                   with criminals. Eye retina scanning requires users to trust that the system will not harm their
                                   eyes, a feeling they carry perhaps owing to  rumors and  insufficient information concerning
                                   how the retinal scanning technology functions.

                                   6.5.4 Uniqueness of Biometrics Organ and Action

                                   The intention of biometrics system is positive identification of the personnel- specified this, it is
                                   significant that the systems are based on unique traits of the employees. So when the base is
                                   exclusive trait, a file match is a positive identification instead of a statement of high probability
                                   that it is the right person. Out of the many physical traits that can be used, only three can actually
                                   be considered unique enough for recognition: the fingerprint, the retina of the eye and the iris
                                   of the eye.

                                   6.5.5 Reliability of Biometrics

                                   When using biometrics verification systems, it is significant that they function in an accurate
                                   fashion. The notion of system’s reliability is connected to its ‘selectivity’. Reliability is a prospect
                                   that a matcher system will properly identify the mate when the mate is present in the system
                                   repository, while selectivity is the number of incorrect mates determined for a specified search.
                                   Only authorized persons must be permissible to access and it must prevent the others without
                                   breakdown in performance correctness or speed.



                                     Did u know? The tradeoff between reliability and selectivity provides the greatest system
                                     design challenge as these parameters are interdependent.
                                   6.5.6 Data Storage Requirements in Biometrics System


                                   Earlier computer systems had primary and secondary memory size constraints, that are restricted
                                   RAM and disk size. This is less of an concern today as computer technology has advanced in both
                                   hardware and software. Even then, the size of biometrics data files is still a factor of interest.
                                   Provided the large size of biometrics match templates, even with the current ultra-high speed
                                   processors, large data files take longer than  small files  to process.  This is particularly so  in
                                   biometrics systems that performs full identification. Typically, biometrics file size varies between
                                   9 and 10,000 bytes, mostly falling in the 256-1,000 byte range.

                                   6.5.7 Enrolment Time in Biometrics

                                   We have discussed ‘matching and enrolment’; enrolment time is also so much of a concern these
                                   days.  In the previous days, biometrics system  sometimes had enrolment process  requiring
                                   many repetitions and numerous minutes to completes.

                                   6.5.8 Ata Collection Intrusiveness

                                   Origins of this factor come from the user’s apprehension regarding the collection of biometrics
                                   data from inside the human body- particularly the retina inside the eyeball. Early biometrics
                                   systems enlightened the retina with a red light beam that happened to coincide with increasing





          80                                LOVELY PROFESSIONAL UNIVERSITY
   81   82   83   84   85   86   87   88   89   90   91