Essay Instructions: Hi Writer?s Username: goodgod2
Topic "Biometric Controls"
In a two-page paper, prepare a cost analysis of three different biometric devices your company wants to implement. Identify the following information:
? Types of devices.
? Costs.
? Type 0 and Type 1 errors.
? How you can safely secure the data from attackers.
Grading Checklist
Activity
Prepares a cost analysis of three different biometric devices.
Identifies the Type 0 and Type 1 errors.
Identifies how to safely secure the data from attackers.
Provides well supported analysis using appropriately formatted references.
References
Barton, B., Byciuk, S., Harris, C., Schumack, D., & Webster, K. (2005). The emerging cyber risks of biometrics. Risk Management, 52(10), 26-28,30-31. http://search.proquest.com/docview/227026083?accountid=27965
Barton, B., Byciuk, S., Harris, C., Schumack, D., & Webster, K. (2005). The emerging cyber risks of biometrics. Risk Management, 52(10), 26-28,30-31. http://search.proquest.com/docview/227026083?accountid=27965
Zorkadis, V., & Donos, P. (2004). On biometrics-based authentication and identification from a privacy-protection perspective: Deriving privacy-enhancing requirements. Information Management & Computer Security, 12(1), 125-137. http://search.proquest.com/docview/212304455?accountid=27965
Readings
Use the library to complete the following:
? Read B. Barton, S. Byciuk, C. Harris, D. Schumack, and K. Webster?s 2005 The Emerging Cyber Risks of Biometrics from Risk Management, volume 52, issue 10, pages 26?31. This paper looks at the concerns of privacy rights versus the use of biometric information for identification and improved security.
? Read Y. Itakura and S. Tsujii?s 2005 Proposal on a Multifactor Biometric Authentication Method Based on Cryptosystem Keys Containing Biometric Signatures from International Journal of Information Security, volume 4, issue 4, pages 288?298. This article examines a proposed biometric model that uses cryptographic systems to avoid biometric information theft. You will refer to this article in an upcoming discussion in this unit.
? Read V. Zorkadis and P. Donos?s 2004 On Biometrics-based Authentication and Identification from a Privacy Protection Perspective from Information Management & Computer Security, volume 12, issue 1, pages 125?137. This article discusses biometric based authentication technologies with regard to legal regulations that protect personal information.