A biometric Access Control System

241 views 6 pages ~ 1499 words Print

A biometric Access Control System is a security system that uses an individual’s biological data to grant or limit access to a secure and restricted area or company information (Andronikou, Demetis, & Varvarigou, 2005). Each biological data is almost always distinct and impossible to impersonate. Hence, biometric systems are crucial tools for increasing organizational security. Iris, hand (form and size), voice, fingerprints, and facial shape are examples of data that can be employed.

The biometric system is a sophisticated intertwine of data collecting, storage, extraction, verification architecture, and transmission. In system enrollment, an individual who aims to access the secure data or secure system begins by presenting their data to a biometric sensor; a hardware that is tailored to capture biophysical data (Andronikou, Demetis, & Varvarigou, 2005). In signal processing, the data captured in the first stage is expanded after compression and transmission. The expansion of the biophysical feature allows quality processing and pattern matching of the intricate detail as captured by the biometric scanner. It gives a template that is specific to the individual’s biophysical profile to be created in the system (Andronikou, Demetis, & Varvarigou, 2005). In Storage, the enrolled data (the individual’s biophysical profile) is stored in a database and attached to a specific user id unique to that particular user. In verification, when a user tries to access the system, the system matches the pattern of the bio data to that which was stored on the system. If it is validated, the user is allowed access if it is not validated the user is denied access (Andronikou, Demetis, & Varvarigou, 2005).

The water utility company chooses to implement a fingerprint recognition system as its preferred means of Biometric Access Control. The fingerprint recognition system is beneficial as it is simple, reliable, helps to ensure security to an organization and helps employees by guarrenteeing that they feel secure in their workplace (El-Sisi, 2011).

Biometric Access Control Implementation

Implantation is a key phase in the development and adaptation of a system. The process aims at capturing the aforementioned stages to allow proper biometric identification and access. In the phase, the feasibility of the designed system is seen in a real-world environment.

The first step in the implementation of the fingerprint recognition system is assessing the needs and security requirements of the Water Utility company. To ensure that the biometric access control system enhances the security of an organization; the water utility company has to create levels of access (El-Sisi, 2011). The innovation involves explaining their security goals, their secure data and who they are willing to access these levels to the systems designer and administrator. At the planning stage, any additional activities that will occur in the implementation stage should clearly be mapped out, and a timeline is accorded to each phase.

Acquisition of hardware and software that suits the fingerprint recognition system is imperative (Andronikou, Demetis, & Varvarigou, 2005). The fingerprint recognition system requires hardware devices that will be able to capture fingerprint for processing by the system such as the fingerprint scanner. Further, software that the company will need to acquire will include operating systems, utility software, databases (for storage of user templates), biophysical processing software and encryption software to ensure the biometric data is secure (El-Sisi, 2011).

The water utility facility needs to be tailored to allow adaptation of a Biometric Access Control System. The facility should have a security command center (for security dispatch, security camera review, perimeter watch, and lock access (Andronikou, Demetis, & Varvarigou, 2005). Further, there needs to be a secure perimeter, token badges, video management systems and fingerprint scanning door locks.

Personnel should be prepared and trained to adopt the new system (Andronikou, Demetis, & Varvarigou, 2005). Weekly workshops should be organized within the facility to orient the personnel with the new system that is being introduced. It is important that the personnel are also trained on handling system hardware and software, system support and system maintenance. The activity will ensure that they can handle the system in future and give timely feedback on the system. Putting into consideration how the system may change the nature of personnel job is imperative, as it ensures smooth implantation of the system (Andronikou, Demetis, & Varvarigou, 2005).

In database development, the files on personnel who will be using the system will have to be enrolled in the system (Andronikou, Demetis, & Varvarigou, 2005). The database as a reference database should be up to date, and administration-testing procedures should be put in place to ensure it is only the system administrator has access to the information.

Documentation of the system should be put in place which is inclusive of training manuals for personnel, patents, privacy, and security documentation as pertains to the system. The new system including the design and implementation phases should also be carefully outlined and documented.

A pilot installation system will be used to incorporate the Biometric Access Control system into the Water Utility Company (Andronikou, Demetis, & Varvarigou, 2005). The installation is departmental, beginning with the security department as they will be in charge of the overall maintenance and supervision of the new security feature of the company. The security personnel will be responsible for the identification of errors associated with the system; which will provide the system with administrator to fix the potential problems.

The last step in the implementation is maintenance and monitoring (Andronikou, Demetis, & Varvarigou, 2005). A means of feedback must be present between the end user and the system administrator which will present improvements and debugging. Second, the system coordinator should have a means of monitoring the implementation and roll out of the design.

The Testing Process

Testing should be done in two phases; initial testing throughout implementation and acceptance testing, which occurs after installation of the system (Andronikou, Demetis, & Varvarigou, 2005). Three levels of evaluation are employed in the initial phase; unit, integration, and system testing (Andronikou, Demetis, & Varvarigou, 2005). These stages of testing are in line with the four components of the system architecture of a Biometric Access Control system, data collection, storage, transmission and signal processing. These four components incorporate both hardware and software features, whose functionality has to be tested. In unit testing, each element is tested and individual functionality is confirmed. In integration, two parts of the systems are tested against each other; bugs and errors are noted and removed. The system checking ensures that the four components of the Biometric architecture structure are working in unison and achieving the desired functionality.

The second part of testing is known as acceptance testing; it is done after installation and in three parts. Verification testing is the first step. It includes the use of simulated data to test the system architecture (Andronikou, Demetis, & Varvarigou, 2005). For instance, in verification testing, the security administrator would be able to access the system using a message sent out through the company network. The sending of specific codes like shutdown, delete all, deny from the administrator should elicit reciprocal replies from the Biometric Access Control System. If the system does not give these responses, then there is a need for fixing of bugs or errors.

Validation (beta) testing allows the system to be tested in a live environment to a select group of users who are not involved in the design of the system ideally (Andronikou, Demetis, & Varvarigou, 2005). The live users should be able to test the human engineering of the new system, performance of the system and the ability of the system to back up and recover in a scenario where the user requires the feature.

The final testing procedure is the audit testing; it allows the designers and the executive of the organization to test and ascertain that the system is reaching the requirements of the organization as captured in the initial phase of the system design process (Andronikou, Demetis, & Varvarigou, 2005). It can only be done after the system has been debuted and used in the real location.

Summary

A biometric Access Control System is a security system that uses an individual’s biological data to allow or restrict access to a secure and restricted area or data as pertains to the business. The fingerprint recognition system is one of the oldest and most reliable forms of Biometric Access Control system. The implementation of the fingerprint recognition system is aimed at enhancing security in the organization and ensuring data and areas are secure and restricted to any unauthorized party. Pending the preparing stage of these systems, the false acceptance rate and false recognition rate are taken into account. Since security was the highest priority, a low facial acceptance Rate is given highest priority in the implementation of the system at the water utility system. Testing is done in two phases; initial checking throughout implementation and acceptance one that occurs after installation of the system.

References

Andronikou, V., Demetis, D. S., & Varvarigou, T. (2005). Biometric implementations and the implications for security and privacy. Journal of the Future of Identity in the Information Society, 1(1), 20-35.

El-Sisi, A. (2011). Design and implementation biometric access control system using fingerprint for restricted area based on gabor filter. The International Arab Journal of Information Technology., 8(4), 355-363.

June 12, 2023
Number of pages

6

Number of words

1499

Downloads:

27

Writer #

Rate:

4.4

Expertise Modern Technology
Verified writer

I needed an urgent paper that had to be done in 5 hours only. I kept looking for help, and it was Kelly who has helped me. Amazing attitude and stellar writing that contained no mistakes.

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro