1 / 7

Part 1 Of Lacrimal Biometric System Case Study

Part 1 Of Lacrimal Biometric System Case Study. Case Study: Aviations Communications Limited AVCOM. By: Kimberly Rankin. Lacrimal Biometrics System Co. Specializes in tear drop analysis

jaafar
Download Presentation

Part 1 Of Lacrimal Biometric System Case Study

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Part 1 Of Lacrimal Biometric System Case Study Case Study: Aviations Communications Limited AVCOM By: Kimberly Rankin Kimberly Rankin System Analysis and Design Section: #1 Instructor: Dr. Eustache Placide

  2. Lacrimal Biometrics System Co. Specializes in tear drop analysis Biometrics authentification for entrance access. Our objective is to provide a tighter security system, so as to ensure identity theft will not be possible. 126 Compress Avenue George Town, KY1-1104 Grand Cayman Cayman Islands Kimberly Rankin System Analysis and Design Section: #1 Instructor: Dr. Eustache Placide

  3. Aviation Communication Limited (AVCOM) • AVCOM is a privately owned Caymanian registered company in operation for over 31 years. It is a relatively small organization with 10 employees ranging from directors to technical staff. It is the largest provider of Two-Way Radio service in Cayman Islands. AVCOMis the only company involved in airport aviation so there is not much competition from the communication market. • AVCOM uses the ISONAS security system. This is a control panel free IP-to –the -opening access control system. The system uses a key fob which is a typeof security token: a small hardware device with built-in authentication mechanisms. Kimberly Rankin System Analysis and Design Section: #1 Instructor: Dr. Eustache Placide

  4. The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the Internet. ISONAS IP is protected by Firewall Mr. B demonstrating how key fob works The red dot indicates that the system is activated Kimberly Rankin System Analysis and Design Section: #1 Instructor: Dr. Eustache Placide

  5. The problem that I found with the ISONAS system is one that could be easily remedied. The system is indeed secure but if carefully planned it could be breached. • It is not possible to enter a secured building without a card but it is easy to use another person’s card to enter the building as there is no other form of verification.Let’s look at this scenario: • If an employee should lose his/her ISONAS card and someone else finds it they can easily use it to enter the building to do whatever they want. • The only way the system could be breached is if an employee lost his/her key fob. This may seem like a small matter but it could lead to dire consequences. Kimberly Rankin System Analysis and Design Section: #1 Instructor: Dr. Eustache Placide

  6. This is my reason for introducing the biometric system to AVCOM . If the system used by AVCOM is modified to a dual system it would be much more secured, because if an employee should lose their card; even if someone else tries to use it the second system would also have to be cleared. • It would be best to use a dual system that cannot be forged. As various body parts are being used in the barometric system as means of authentication, coupled with ISONAS this would make the system even more secure. The finger print has already being established with ISONAS but research has proven that finger prints can be lifted. • The name biometric, suggest some element of the body is being used. In this case the teas of an employee will be used to verify authentication. • Avery unique body fluid could be used as everyone’s chemistry is different. In this case the teas of an employee will be used to verify authentication. It is virtually impossible for anyone to acquire a tear sample from another person unless it is given directly to them. Kimberly Rankin System Analysis and Design Section: #1 Instructor: Dr. Eustache Placide

  7. Technology is on the increase and so is the expertise of the criminal mind that will have no difficulty lifting a finger print. In the business world the majority of customers are somewhat satisfied with their security system; but they are still seeking avenues to gain tighter security. • Our product is designed to give peace of mind to our customers knowing that your security system will not be violated. • The Lacrimal Biometric system can be easily integrated into any security system making it into device to suite your specific needs Kimberly Rankin System Analysis and Design Section: #1 Instructor: Dr. Eustache Placide

More Related