Information Technology in Security Systems - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Information Technology in Security Systems

Description:

The evolution of current Information Technologies and the impact on future Security Systems ... The Ideal Biometric through Zephyr Analysis ... – PowerPoint PPT presentation

Number of Views:79
Avg rating:3.0/5.0
Slides: 17
Provided by: dane73
Category:

less

Transcript and Presenter's Notes

Title: Information Technology in Security Systems


1
Information Technology in Security Systems
  • Brian Grigsby
  • Dan Ellis
  • Azzam Azzam

2
Integration of Information Technology into
Security Systems
  • The History of Security Systems
  • The development and integration of Information
    Technology into security Systems post September
    11, 2001
  • The evolution of current Information Technologies
    and the impact on future Security Systems

3
The History of Security Systems
  • Mechanical Security/ Alarm Systems
  • Electrical/Mechanical Security/Alarm Systems
  • Microprocessor controlled or monitored
    Security/Alarm Systems
  • Inclusion of Information Technology

4
The development and integration of Information
Technology into security Systems post September
11, 2001
5
Biometric Technologies
Finger Scan
Facial Recognition
Palm / Hand Scan
DNA
Iris Scan
Retinal Scan
Voice Scan
6
Comparison of Biometric Systems
Each type of biometric has its particular
strengths and weaknesses. As a result, each has
different applications most appropriate and
common in its use.
7
The Ideal Biometric through Zephyr Analysis
Ideal Biometric
Keystroke Scan
Hand Scan
Signature Scan
Facial Scan
Finger Scan
Retina Scan
Voice Scan
Iris Scan
The perfect biometric, as represented by the top,
center axis, would be, in theory, unintrusive,
accurate, affordable, and easy to operate. This
chart compares each of the biometric measures,
showing how successful each is at these four
features, with less effective features appearing
near the center and more effective features
appearing near the ends.
Intrusiveness Accuracy Cost Effort
8
2001 Biometric Technology Market Share
Current sales of biometric measures are still
heavily weighted toward fingerprint scanning,
though that is anticipated to change in the next
five years with facial recognition and iris
recognition gaining market share.
9
2005 Biometric Technology Market Share
10
01 vs 05 Biometric Technology Market Share
11
The evolution of current Information Technologies
and the impact on future Security Systems
  • Two problems prevented from building an efficient
    information system
  • Government acquisition of information systems has
    not been routinely coordinated
  • legal and cultural barriers often prevent
    agencies from exchanging and integrating
    information

12
5 principles to develop information system for
homeland security
  • Balance security requirements with people
    privacy.
  • Federal, state, and local government are
    one-entity
  • Capture information once at the source and used
    many times
  • to support multiple requirements

13
5 principles to develop information system for
homeland security (contd)
  • Create databases of record, which will be trusted
    sources
  • of information.
  • The homeland security information architecture
    will be
  • a dynamic tool, recognizing that the use of
    information
  • technology to combat terrorism will continually
    evolve
  • to stay ahead of the ability of terrorists to
    exploit our
  • systems.

14
Integrate information sharing across federal
government
  • New coordination groups will recommend better
  • information-sharing methods
  • Border security
  • Transportation security
  • Emergency response
  • Chemical, biological, nuclear, and radiological
    countermeasures
  • Infrastructure protection.

15
Integrate information sharing across state and
local governments, private industry, and citizens
  • Several efforts are underway to enhance the
    timely
  • dissemination of information
  • - First FBI and other federal agencies are
    augmenting
  • the information available in their crime and
    terrorism databases

16
Integrate information sharing across state and
local governments, private industry, and citizens
(contd)
  • Second state and local governments should use a
    secure intranet
  • to increase the flow of classified federal
    information to state and
  • local entities
  • Third secure video conferencing capability
    connecting officials
  • Fourth Expansion of the .gov' domain on the
    Internet
Write a Comment
User Comments (0)
About PowerShow.com