• Research for Developing a New Security System Using Biometric Data in RFID enabled Smartcards

    Pages: 73

    The 73 page paper is an in-depth look at the way in which technology may be utilized strategically in the form of a smart card, incorporating both biometric data and RFID technology in order to increase the effectiveness and efficiency of security within an organization. The paper presents an introduction to the subject, includes objectives as well as limitations. The majority the paper is made up of a literature review examining the role of strategy in security, the development and role of smartcards, including the underlying technology, the use of RFID and the value of biometrics. The methodology for research is provided. This is then applied to a case study. The bibliography cites 51 sources.

    File: TS14_TEsmartrfid2.rtf

    Send Me This Paper »


    Sample Text:
    in the Commercial Environment 10 2.1.2 Strategy in the Commercial Environment 11 2.1.3 Security and Strategy 16 2.1.4 Types of Risk 19 Categorizing Risk 19 Table 1 Risk Matrix 21 Risk and Security Management 22 2.2 Smart Cards 24 2.2.1 What are Smartcards 25  2.2.2 Development of Smartcards 26 2.2.3 Card Characteristics 30 Figure 1 Contact Smart Card 31 Figure 2 A Contactless Smart Card 32 2.2.4 The Microprocessor 34 Table 2 Authentication Process 34 2.3 RFID 35 2.3.1 Applications of RFID 36 2.3.2 Advantages of RFID in  ID Cards 38 2.3.3 RFID Standards and Security 40 2.4 Biometric Data 43 2.4.1 What is Biometric Data 43 2.4.2 Creating the Data 46 2.5 Assessment Techniques 47 2.5.1 Cost Effectiveness Analysis 47 2.5.2 Cost Benefit Analysis 49 2.5.3 Other Assessment Models 50 2.6 Conclusion 51 3. Methodology 51 3.1 Methodological Framework 51  3.1 Methodological Approach 53 3.3 Data Sources 59 3.3.1 Secondary Sources 59 3.3.2 Primary Sources 60 3.3.3 Ethical Issues 61 4. The Case Study 63 4.1 Background to the Case Study 64 4.1.1 Current Security Systems 64 4.2 Potential Change 67 4.3 Potential Impact of the New System 70 Table  3 Implementation costs 71 Table 4 Operating cost comparison 72 5. Conclusion 73 Glossary 73 References 74  1. Introduction In any industry there is a requirement for security, areas where security are needed can include the access to physical and intangible resources and the potential to use,  misuse, misappropriation, damage or other abuse of the firms assets. Physical access controls are often seen as part of the wider range of security measures that make up a security  policy. Traditionally, there have been the use of ID cards; ID cards would be issued usually including a photograph of the authorised employees1, the system would rely on manual checks  by security staff checking the appearance of the user against the photograph on the card. This has been a system that had inherent weaknesses, from the potential for ID cards  to be altered or forged, to the potential for human error and the inherent costs and delays associated with many systems. However, these can be ineffective and new technology is 

    Back to Results