Juan Ortega 12/15/09 NTS490

minorbigarmSecurity

Nov 30, 2013 (3 years and 9 months ago)

132 views

Juan Ortega

12/15/09

NTS490

Justification/purpose to deploy biometrics:

The university decided to come to the 21’st century and upgrade the
already implemented biometrics.



Newer biometrics devices have a higher accuracy rate.



Access
-
control system



Potential for newer biometric devices.


The new biometric devices will be used for in various facilities around
the campus such as:



Resident Halls


Athletic facilities



Limit dining
-
hall access

Fingerprint
Recognition

The best biometric device to implement for
this specific scenario would be fingerprint
recognition.


Cheap



Fast



Small sized



Low power



Fairly accurate



Easy
-
to
-
use



Number of ridges and valleys on the surface of
the finger.



Ridges are the upper skin layer segments of the
finger and valleys are the lower segments.



The ridges form so
-
called minutia points ridge
endings.


The uniqueness of a fingerprint can be
determined by the pattern of ridges and furrows as
well as the minutiae points.

Fingerprint biometrics. Retrieved December 15, 2009 from biometricnewsportal
Web site:
http://www.biometricnewsportal.com/fingerprint_biometrics.asp


Because the previous biometric
implementation happened in
1972, much of the installation,
configuration, and operational
processes will need to be
modified for this new technology.

The previous biometric
deployment policy would also
need to change, but the main
principles will remain, some of
them are:



Public acceptability



Practicality of capture



Practicality of deployment



ROI

Biometrics Deployment of Machine Readable Travel Documents. Retrieved December 15,
2009 from
aclu

Web site:
http://www.aclu.org/files/passports/TechnicalReport.pdf


1)

Location of the centralized access
-
control system.


2)
Total cost and the ROI must be calculated.


3)

Compatibility with the current infrastructure.


4)

Regulatory


5)

Operational


6)

Training and user acceptance.

1)
Remove old biometric devices


2)

Identify the locations where a biometric
device is needed.


3)

Depending on the device, some need to be
screwed as a door handle, while others are
just for identification.


4)

If the devices are wireless, a wireless access
point needs to be establish prior to the
implementation.


5)
Software for identification and verification
needs to be installed.


6)
Verification process begins to ensure all
equipment and software is installed properly.



Installation Plan



Make sure everything's installed.



Everything’s tested




Training Plan



Initial user training for the biometric.




Communication Plan



C
lear, timely and consistent
communication.




Schedule



Maintenance




Other deployment documents



Risk Assessment



Deployment Design