Sie sind auf Seite 1von 4

Biometrics I Page 1 of 4

Module Learning Outcomes


Explain the concepts of associated with the various Biometrics and taxonomy.

Discuss the advantages and limitations associated with Biometrics measurement and security. Explain and apply the underlying techniques involved with Biometrics.

The scenario
B-TEC Inc. is a small biotechnologies research company, and has 50 employees and a single Microsoft Windows 2003 server with Active Directory implemented. All workstations are Microsoft windows XP. One of the unique traits of B-TEC Inc. is that they bring in biotechnology consultants for short to long periods of time. They have had at least one incident where a previous consultant gained access using an old password (username and password are not removed from database). This one incident caused grave damage and cost B-TEC Inc. one of their major clients. (Although the method in which the consultant obtained the password must be identified to ensure that
future incidents do not occur, for our purposes it is only important to know that password was wrongfully obtained.)

Based on this incident, and in an effort to better protect the company assets (research and biotechnologies data), the CEO has brought you in to design and implement a biometric network identification/authentication solution. Additionally, because some users work in clean rooms with latex gloves and in some cases masks on, it is important that the solution be able to accommodate these users as well as other users, while providing some user convenience. All necessary data encryption has already been implemented and leverages Active Directory for authentication/identification. The CEO has mentioned that each system purchased contains a sound card, microphone, and web camera so the users can web conference with their clients. The Active Directory design is straight forward, and the users are divided up evenly with ten users per department. One server exists in the environment, but the server contains four Pentium 1.8 GHz processors, 12GB memory is very excessive, has plenty of storage capacity (2 TB) .therefore the CEO does not want to purchase any additional server. Rather, he would like to layer the biometric solution on top of the server services. Cost is not the most important factor but is definitely a consideration. Finally no other special features are required but if possible, the CEO would like the ability to leverage on them in the future. (It is generally and highly recommended that hardware redundancy and at least two Domain Controllers be implemented in any environment. We show one for ease of understanding.) Hints:
Level 2 Asia Pacific Institute of Information Technology xx/xx/08

Biometrics I Page 2 of 4

Different biometric devices will be required in certain areas. No remote access is needed. Most sensitive data is classified as confidential. Server identification/authentication is required. Fingerprint acquisition devices must check for live fingers. Biometric template store must be encrypted.

Requirements This is an individual assignment. You are required to submit a report outlining the various techniques / technologies that are available for each of the following security areas; Biometrics and Network Operating Systems. Among areas to consider in your report are technological considerations, feasibility, implementation issues (pre and post), roll out and benefits of these considerations. Guidelines for the Report Your completed document should meet the following requirements: 1) 2) 3) 4) 5) 6) Table of Contents for every detailed chapter/section. Main Document (structured into chapters/sections with an introduction, chapter-1, . , and conclusion) Limitations/Extensions to the case study. Work Breakdown Structure (WBS) Appendices List of References

A conclusion should also be produced that makes a series of recommendations to the company based upon the previous three sections. The total word count for this assignment is no more than 3000 words. Harvard referencing should be used at all times.

Marking Grid

Level 2

Asia Pacific Institute of Information Technology

xx/xx/08

Biometrics I Page 3 of 4

(10) Documentation Structure

Critical Thinking and

Research and Investigation (20)

Quality of Information, Relevance and Analysis (20)

Presentation (20)

Name:

Submission requirements A bounded hardcopy of the assignment and one softcopy to be attached and submitted along with the assignment. Presentation Weighted at 20%. Prepare and present an overview of the report. The presentation will last approximately 15 minutes followed by a five minutes where you will be expected to answer questions relating to the report / presentation. The presentation will be given in a professional manner.

Level 2

Asia Pacific Institute of Information Technology

Applicability (20)

Grand Total (100)

Referencing (10)

xx/xx/08

Biometrics I Page 4 of 4

Assessment Criteria Distinction Demonstrated comprehensive research with detailed evidence. High level of analysis performed, exceptional and thorough knowledge and understanding displayed with regard to application. This includes analysis and evaluation of facts followed by results of evaluation. Documentation presented in a professional manner, following proper sequencing and flow. Displayed evidence of critical appraisal. Excellent communication and presentation skills displayed along with good language proficiency. Questions posed during the presentation were answered well with the ability to relate the answers to analysis and research performed. Credit Adequate research conducted with fair detail of evidence presented. Moderate level of understanding, analysis and knowledge displayed. Some level of relevance included in terms of application. Moderate level of analysis and evaluation of facts followed by results comparison. Good level of documentation presented. Some level of reflection was evident in the documentation. Moderate level of critical appraisal. . Language proficiency, presentation skills and communication skills were good. Questions posed were answered fairly well. Pass Low level research conducted. Some evidence of research displayed. Basic level of understanding and knowledge analysis displayed. Satisfactory level of documentation. No evaluation and analysis of facts, no results comparison performed Satisfactory or low level of reflection displayed. No level of critical appraisal demonstrated. Satisfactory level of presentation and communication skills. Questions posed were answered with minor errors.

Level 2

Asia Pacific Institute of Information Technology

xx/xx/08

Das könnte Ihnen auch gefallen