Title: Information Technology in Security Systems
1Information Technology in Security Systems
- Brian Grigsby
- Dan Ellis
- Azzam Azzam
2Integration of Information Technology into
Security Systems
- The History of Security Systems
- The development and integration of Information
Technology into security Systems post September
11, 2001 - The evolution of current Information Technologies
and the impact on future Security Systems
3The History of Security Systems
- Mechanical Security/ Alarm Systems
- Electrical/Mechanical Security/Alarm Systems
- Microprocessor controlled or monitored
Security/Alarm Systems - Inclusion of Information Technology
4The development and integration of Information
Technology into security Systems post September
11, 2001
5Biometric Technologies
Finger Scan
Facial Recognition
Palm / Hand Scan
DNA
Iris Scan
Retinal Scan
Voice Scan
6Comparison of Biometric Systems
Each type of biometric has its particular
strengths and weaknesses. As a result, each has
different applications most appropriate and
common in its use.
7The Ideal Biometric through Zephyr Analysis
Ideal Biometric
Keystroke Scan
Hand Scan
Signature Scan
Facial Scan
Finger Scan
Retina Scan
Voice Scan
Iris Scan
The perfect biometric, as represented by the top,
center axis, would be, in theory, unintrusive,
accurate, affordable, and easy to operate. This
chart compares each of the biometric measures,
showing how successful each is at these four
features, with less effective features appearing
near the center and more effective features
appearing near the ends.
Intrusiveness Accuracy Cost Effort
8 2001 Biometric Technology Market Share
Current sales of biometric measures are still
heavily weighted toward fingerprint scanning,
though that is anticipated to change in the next
five years with facial recognition and iris
recognition gaining market share.
9 2005 Biometric Technology Market Share
1001 vs 05 Biometric Technology Market Share
11The evolution of current Information Technologies
and the impact on future Security Systems
- Two problems prevented from building an efficient
information system - Government acquisition of information systems has
not been routinely coordinated - legal and cultural barriers often prevent
agencies from exchanging and integrating
information
125 principles to develop information system for
homeland security
- Balance security requirements with people
privacy. - Federal, state, and local government are
one-entity - Capture information once at the source and used
many times - to support multiple requirements
135 principles to develop information system for
homeland security (contd)
- Create databases of record, which will be trusted
sources - of information.
- The homeland security information architecture
will be - a dynamic tool, recognizing that the use of
information - technology to combat terrorism will continually
evolve - to stay ahead of the ability of terrorists to
exploit our - systems.
14Integrate information sharing across federal
government
- New coordination groups will recommend better
- information-sharing methods
- Border security
- Transportation security
- Emergency response
- Chemical, biological, nuclear, and radiological
countermeasures - Infrastructure protection.
15Integrate information sharing across state and
local governments, private industry, and citizens
- Several efforts are underway to enhance the
timely - dissemination of information
-
- - First FBI and other federal agencies are
augmenting -
- the information available in their crime and
terrorism databases
16Integrate information sharing across state and
local governments, private industry, and citizens
(contd)
- Second state and local governments should use a
secure intranet - to increase the flow of classified federal
information to state and - local entities
- Third secure video conferencing capability
connecting officials - Fourth Expansion of the .gov' domain on the
Internet