ISSC325_Clark_Week7_Assignment

docx

School

Virginia Tech *

*We aren’t endorsed by this school

Course

325

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

6

Uploaded by SuperHumanMulePerson924

Report
1 Week 7 Assignment Michael Clark American Military University ISSC 325: Biometrics Dr. Cooper, Harry October 22, 2023
2 Week 7 Assignment Recently the team and company have been aware that equipment from Acme Logistics has been taken during business hours. We have questioned all the teams and individuals associated with the company and no one has been able to assist with identifying who is responsible. We have determined that throughout the facility there are three main doors for entering and exiting. They remain unlocked during business hours and have no methods of security. This security proposal is to support why Acme Logistics needs to consider investing in biometric devices, surveillance systems, and other items of technology that seem necessary for the company. There are multiple devices of technology that we are going to discuss and explain why they provide a purpose of security for this scenario. We need a method of security in place to effectively have multiple forms of security to prevent intrusion and possible penetration attacks from happening. The first device that we will discuss is Video Surveillance Systems and the type that we need to consider. Gait analysis is the process of gathering biometric data, specifically focusing on an individual’s walking pattern. The detailed analysis of these walking patterns can provide a valuable sources of information from the unique characteristics of individuals. van Mastrigt and others (2018) describe this type of analysis as minimal to no user interaction by using an algorithm to calculate the gait and compare to each individual that has been on surveillance; Overtime the system gathers more information which provides improved accuracy. (p. 184) Fingerprint scanners would also provide a reasonable source of security upon entry and exit. Every individual has their own unique fingerprint, and none are the same. Someone can
3 have the same hair, eyes, smile, or facial features, but a fingerprint is unique. This can offer a method of logging through an operating system with information such as time stamps, personal identifiable information (PII), and other critical data, that can offer real time auditing for records. This form of authentication also lowers the concern of discrimination over using something such as facial recognition. As for muilti-factor authentication method, Near Field Communication (NFC) Card Reader Locks can assist with the last method of access control that could be implemented. NFC Smart Card readers would be the preferred method of access control over the other option of Radio-Frequency Identification, due to the convenience of communication relying on short range frequencies, over wide range of frequencies. This recommendation is the best as Li and others (2018) describe that various biometric data such as fingerprints, iris, or facial recognition can be stored on the cards to serve as an additional factor of authentication (p. 2). The last type of technology that we need to discuss is surveillance cameras. Due to the different types of security we discussed, there is nothing really special we need to cover about surveillance. Some may argue or suggest that motion detection should be considered, but there are numerous disadvantages when it comes to this technology device. Bowman (2018) mentions that motion detection is troubled mainly with false positives, tampering, and vulnerabilities. Now any camera can be tampered with, but this is why we are going to consider an aerial view of the office and each door to eliminate these concerns. These four different forms of security and authentication can be offered to secure the environment of the office. This may seem excessive, but at the end of the day we don’t want to wait until a larger scenario of theft occurs to consider the best option for the office. Each gait detection system that we would invest in would cost anywhere between $100-$500 each. This
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 would depend on the vendor, specifications, and any other features that may come with it. To start off we would need to consider three at minimum for each door. We would test and position these system to ensure that they a wide area of coverage and avoid any possibility of not working correctly. Fingerprint scanners have different ranges in price. There is no unique feature or characteristic that needs to be discussed. The average price for a fingerprint scanner is around $500. In total of needing three at each door, the cost will come to $1500. This is going to be the higher priced device of technology that we need to include, but it will provide another means of access control and identification. NFC Card Reader Locks is going to be the only device that we will invest in to offer two different forms of security. NFC cards can be used to upload information, which can be used through access control by determine authentication, authorization, and availability. Every employee will have their credentials added to their card and every entry and exit will be logged into the system. This provides another system of monitoring and auditing. Card readers cost around $300 each and NFC cards $25 to $50 for a count of 50. Finally, security surveillance cameras will be the easiest decision we will cover over the technology discussed today. The only feature or characteristic that we need to focus on is a WiFi Security Camera that keeps recordings for 30 days. Most WiFi cameras are compatible with an application that allows a user to view recordings, logs, and other information remotely. This will provide easier accessibility for any concerns that we may have within the office. Typically, WiFi cameras range from $100-$150 each.
5 The estimated time frame for the company to roll out this project is projected 5-8 weeks. This includes shipping of all the devices, deployment, and testing. We want to ensure that everything is in place correctly and to test functionality. We as well want to guarantee that everyone part of this proposal knows how the equipment works incase of technical issues or other scenarios. The last step is getting approval from everyone to start the surveillance of the office. We will create User Agreement Release forms for every employee within the office so we have documentation that everyone understands why the security measures have been put in place and how it protects them. Providing this information and documentation also allows for all evidence to be used in a court of law for any feature events. This guarantees that for any event that may occur, everyone was aware of the information we requested from them for the fingerprint machine, gait analysis, credentials for NFC cards, and that they are under surveillance. For these reasons, the theft from Acme Logistics brings multiple security concerns throughout the company. This proposal should have covered the basics of understanding why and how this should be addressed. The last thing to note is that through testing we should providing a vulnerability assessment to determine any flaws in the security plan and deployment.
6 References Bowman, J. (2018, January 8). Motion detection in security cameras: When to use it and why does it suck (sometimes)?. Arcdyn Articles. https://www.arcdyn.com/articles/motion- detection-in-security-cameras-when-to-use-it-and-why-does-it-suck-sometimes/#:~:text=False %20positives%20from%20trees%20blowing,to%20be%20less%20than%20useful. Li, B., Tian, M., Zheng, S., & Jiang, S. (2018). Design of access control system based on the near field communication (NFC) technology. IOP Conference Series.Materials Science and Engineering, 452(4) doi:https://doi.org/10.1088/1757-899X/452/4/042020 van Mastrigt, N.,M., Celie, K., Mieremet, A. L., Ruifrok, A. C. C., & Geradts, Z. (2018). Critical review of the use and scientific basis of forensic gait analysis. Forensic Sciences Research, 3(3) Retrieved from http://ezproxy.apus.edu/login?qurl=https%3A%2F %2Fwww.proquest.com%2Fscholarly-journals%2Fcritical-review-use-scientific-basis-forensic %2Fdocview%2F2195309848%2Fse-2%3Faccountid%3D8289
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help