Verified Document

Biometric Information Systems And Privacy Essay

The identifying template is a binary file that has a series of zeros and ones. The algorithm then uses the template in a positive way for the identification of an individual during subsequent fingerprint scans. Therefore it is safe to say that no image is ever stored or even transmitted across any network. Furthermore, the algorithms are usually one way-based meaning that it is impossible for the recreation of the original biometric image when a template has been extracted. It is hence nearly impossible to reverse engineer the data that has been set to positively identify an individual and in the process mange to successfully steal the biometric identity of that individual (Rhodes, 2003) Biometric systems that involve fingerprints have matures and have become more sophisticated over the years. It has become impossible to photocopy or even mold an individual's fingerprint. Vascular biometrics on the other hand requires a flow of blood in the veins for near infrared light to capture successfully the finger or palm vein pattern. Furthermore the biometric systems require the physical presence of individuals for any identification, it rather impossible to enroll in biometric systems with the use of anything apart from an individual's physical characteristics. On the other hand the use of the term nearly impossible when it comes to the reversing of biometric data means that it is certainly possible that hackers can reverse engineer the biometric data and thereafter recreate an image. These systems undermine privacy by making the theft of an individual's identity a more likely occurrence (Wade, 2012). Once a biometric image has been stolen and used for theft or fraud it cannot be revoked since no one can make changes on their fingerprints.

Whether or not the biometric systems offer privacy benefits lies on how correctly these systems are used. organizations that have implemented the use of biometric systems often are not very open on their intentions of operating this systems this therefore build mistrust of the technologies and this leads to some questions being asked. Biometric information's often reveals information of an individual and therefore be protected fully and appropriately in the biometric system. Therefore every biometric system should have a privacy impact assessment completed...

These assessments should consider whether the biometric systems are proportionate and an acceptable solution to the problem at hand. They should also put into consideration whether the application should seek to identify or authenticate the users and if so whether it is necessary to capture an image when they are being enrolled or whether templates alone are sufficient for the delivery of the necessary functions. It is essential for the nurturing and protection of the trust that the public has on biometric systems. Just a single breach in the privacy of an individual when a biometric system is used can lead to the destruction of the confidence in all biometrics since stolen biometrics cannot be replaced.
References

Answers Corporation, (2012). IDENT (Automated Biometric Identification System)

Retrieved November 27, 2012 from http://www.answers.com/topic/ident-automated-biometric-identification-system

International Association for Identification. (2012). Biometrics Information Systems. Retrieved November 27, 2012 from http://www.theiai.org/disciplines/biometrics/index.php

International Biometric Group, (2010). BioPrivacy FAQ's and Definitions. Retrieved November

27, 2012 from http://www.bioprivacy.org/FAQ.htm

International Biometric Group. (2010). Best Practices for Privacy-Sympathetic Biometric

Deployment. Retrieved November 27, 2012 from http://www.bioprivacy.org/best_practices_main.htm

Rhodes, a.K. (2003). Challenges in Using Biometrics .Retrieved November 27, 2012 from http://www.gao.gov/products/GAO-03-1137T

Strickland, J., (2012). How will biometrics affect our privacy? Retrieved November 27, 2012

from http://computer.howstuffworks.com/biometrics-privacy.htm

Wade, H. (2012).Disadvantages of Biometric Identification Systems. Retrieved November 27,

2012 from http://www.ehow.com/list_5969015_disadvantages-biometric-identification-systems.html

Zalman, a., (2012). Biometric Identification & Homeland Security -- Biometrics Pros and Cons.

Retrieved November 27, 2012 from http://terrorism.about.com/od/controversialtechnologies/i/Biometrics_2.htm

Sources used in this document:
References

Answers Corporation, (2012). IDENT (Automated Biometric Identification System)

Retrieved November 27, 2012 from http://www.answers.com/topic/ident-automated-biometric-identification-system

International Association for Identification. (2012). Biometrics Information Systems. Retrieved November 27, 2012 from http://www.theiai.org/disciplines/biometrics/index.php

International Biometric Group, (2010). BioPrivacy FAQ's and Definitions. Retrieved November
27, 2012 from http://www.bioprivacy.org/FAQ.htm
Deployment. Retrieved November 27, 2012 from http://www.bioprivacy.org/best_practices_main.htm
Rhodes, a.K. (2003). Challenges in Using Biometrics .Retrieved November 27, 2012 from http://www.gao.gov/products/GAO-03-1137T
from http://computer.howstuffworks.com/biometrics-privacy.htm
2012 from http://www.ehow.com/list_5969015_disadvantages-biometric-identification-systems.html
Retrieved November 27, 2012 from http://terrorism.about.com/od/controversialtechnologies/i/Biometrics_2.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

Health Information Systems HIS and Nursing Informatics
Words: 4777 Length: 5 Document Type: Term Paper

A1. Advantages and Disadvantages of a System All health information systems (HIS) come with great advantages and some disadvantages that must be taken in account to keep patients safe. A HIS is a system that captures, retains information, and helps manage it. A HIS can be used to send health information within an organization and outside of the organization. Several items within a healthcare organization have interoperability with the HIS such

Protection of Information Systems and Data
Words: 2006 Length: 6 Document Type: Other

Security Cryptography In order to maintain information secrecy one would use cryptography. This is intentionally making information unintelligible. This method is mainly employed during the transmission of information. Cryptography ensures that only the intended person would be able to decipher the information (Whitman & Mattord, 2011, p. 339). The process of deciphering encrypted text is referred to as cryptanalysis. Cryptology is the mathematics branch covering cryptography and cryptanalysis. Cryptology has been

Biometric Security in Both the
Words: 1181 Length: 4 Document Type: Term Paper

It also helps to reduce the threat of identity theft as this is frequently initiated through the hacking of such highly vulnerable wireless communication devices. According to ThirdFactor, the same BioLock technology is currently being adapted to meet the needs of the Microsoft Windows and Mac OS packages on the market's near horizon. This suggests that the pacesetting consumer brands in the technology, software, cell phone and computing industries

Biometric for Security
Words: 1493 Length: 5 Document Type: Dissertation

This was done by creating an artificial fingerprint from the little traces that are left on the biometric scanners. This entailed the process of obtaining the relevant biometric data. The second approach involved employment of a technique that is commonly referred to as deploying a replay attack. In this approach is equivalent to the man-in-the-middle attack that is common in various communication data breaches. The process involves the tapping

Information Security
Words: 2504 Length: 8 Document Type: Term Paper

Security The following will look at case review questions based on the book known as Principles of Information Security by Michael E. Whitman. Chapters 4, 5, 6, and 7 were read through and case questions were given for each of these chapters. Case review question answers will be incorporated with material from the chapter reading that accompanies it. Chapter 4's introduction has a scenario of a man known as Charlie. He

Information Technology IT Security Systems
Words: 3128 Length: 11 Document Type: Essay

Computer Security Systems The report provides new security tools and techniques that computer and IT (Information Technology) professionals, network security specialists, individuals, corporate and public organizations can employ to enhance security of their computer and information systems. In the fast paced IT environment, new threats appear daily that make many organizations to lose data and information that worth billions of dollars. In essence, the computer and IT security professionals are required

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now