ABSTRACT
In every facet of life and business,
questions on the acceptability and use of computer printouts have for some time
been very practical. They demand quick answers if the law must be an instrument
for effective social and economics engineering and must not out of date burden.
Business in other parts of the world, practically every serious minded business
or other organization in Nigeria has quite some time used computer for ordinary
record keeping and accounting. Understanding and interpreting a large data
source is an important issue challenging operation in many technical
disciplines. Security issues are not only a phenomenon of the digital world in the
off line world, we are also confronted with privacy issues, consciously and
unconsciously. This project work raised awareness for this topic and give over
view of biological verification system issues, which are typically associated
with the use of information technologies in the digital world. Solutions to
avoid risk concerning privacy issues were pointed out and possibilities of
protecting privacy in the digital world are shown in this project work and the
language used in the designing of this project is Visual Basic which was use in
designing the front end and Microsoft SQL was use in designing of the back End
which is the Database.
TABLE OF CONTENTS
Cover page… … … … … … … … … …i
Title page… … … … … … … … … … …ii
Certification … … … … … … … … … …iii
Dedication … … … … … … … … … …iv
Acknowledgment … … … … …. … … … ….v
Table of Contents … … … … … … … … …vi
Abstract … … … … … … … … … … …viii
CHAPTER ONE
1.0 INTRODUCTION… … … … … … … …
1
1.1
Background of the study… … …
… … …
… …
… … .. 2
1.2
Statement of Problem… … …
… … …
… … …
… … .. 3
1.3 Research Question… …. … … … …
… … …
... 3
1.4 Aims of the
study… … …
… … …
… … …
… … … ..
4
1.5
Objectives of the study… …. … … …. … … … …4
1.6 Scope of the study... … … … … … … …
... … ..4
1.7
Significance of the Study… … … … … … …
…5
1.8
Limitation of the study… … ….
… … …
… … …
… .. 5
1.9 Definition of terms… …
…. … … … …
… … …
… … 5
CHAPTER TWO
2.0
LITERATURE REVIEW
2.1
Current
Law on Biological Security… … …
… … …
… .. 9
2.2
Security
Management in Organisation… … … … ….11
2.3
Categorising
Security… … … … … … … … …
..12
2.4
Types
of Security … … … … …
… … …
… … 12
2.5
Application
of Biological verification System… … … …
… 12
2.5.1
Criminal
Justice System… … … … …
… … … 13
2.5.2
Immigration
and Asylum… … …
… … …
… … …
… 13
2.5.3
Port
and Border Security… … … … … … …
14
2.6
Current
Issues in Human Security… … … … … … 15
CHAPTER THREE
2.0SYSTEM ANALYSIS AND DESIGN
3.0.1
System
Analysis… …. … … … … …
… … …
…18
3.1
Analysis
of the Existing System … … … … … … .19
3.2
Problem of the Existing System… … … … …
… ….22
3.3 Instrumentation/material… …
… … …
… … …
… … …22
3.4 Data
Collection/Analysis… … …
… … …
… … …
.. 23
3.5 Database
Design… … …
… … …
… … …
… … …
23
3.6 Screen
Shots… … …
… … …
… … …
… … … …
24
3.7 Program
Flowchart… … …. …
…
… … …
… … … … 29
CHAPTER FOUR
4.0 SYSTEM IMPLEMENTATION
4.1
Approaches
to System Design … … … … …
... … ..31
4.2
Control
Centre… … … … … … …
… … …. … 33
4.3
Input/Output
formats with Screen Prints…. … … … …
… 35
4.4
Overall
Data Floe Diagram… … … … … … …
….36
4.5
Hardware
and Software Requirement… … …
… … … … … 37
4.6
System
Flowchart… … …
… … …
… … …
… …. … 38
4.7
System
Test… …. …
… … …
… … …
… … … 39
4.8
System
Maintenance… … …
… … …
.. … …
… … …
42
4.9
System
Requirements… …. ….
… … …
… … …
… … 43
4.10
Choice
of Programming Languages used… … …
… … … … 45
4.11
Program
Testing… … …
… … … …
… … …
… … … 47
CHAPTER FIVE
Summary, Conclusion and
Recommendation
5.0 Summary
… … … … … … … …
… … …
… 51
5.1 Conclusion… …
… … …
… … … …
… … … … …
53
5.2 Recommendation…. ….
… … … … …
… … …
… .. … 54
References … … … … … … …. … … … .56
Appendices: Program/Source code… … … …. … …
58
CHAPTER ONE
1.0 INTRODUCTION
Personal identification is ever present in our daily lives.
For example we often have to prove our identity for getting access to bank
accounts, entering a protected site, withdrawing cashing from an ATM machine,
logging into a computer, and so on. Conventionally, we identity ourselves and
gain access by physically carrying passports, keys, access cards or by
remembering passwords, secret codes, and Personal Identification numbers
(PINs).
Unfortunately, passport, keys, access cards can be lost,
duplicated, stolen, or forgotten; and password, secret codes and Personal
Identification Numbers (PINs) can easily be forgotten, compromised, shared or
observed. Such deficiencies of conventional personal identification techniques
have caused major problems to all concerned. For example, hackers often disrupt
computer networks, credit card fraud is estimated at billions dollars per year
worldwide. Therefore, robust, reliable and foolproof personal identification
solutions must be sought in order to address the deficiencies of the
conventional techniques, something that could verify that someone is physically
the person he/she claims to be. A biological verification system is a unique,
measurable characteristic or trait of a human being for automatically
recognized or verifying identity. By using a biological identification, the
individual verification can be done by doing the statistical analysis of
biological characteristic. This measurable characteristic can be physical, e.g.
eye, face, finger image and hand, or behavioural, e.g. signature and typing
rhythm. Besides bolstering security, the systems also enhance user convenience
by alleviating the need to design and remember multiple complex passwords.
In spite of the fact that automatic recognition systems based
on fingerprints have been used by law enforcement agencies worldwide for over
40years, biological recognition continues to remain a very difficult pattern of
recognition problem. Therefore, a proper system design is needed to verify a
person quickly and automatically (Uludag et al 2004).
In this project, a biological system is proposed for human
verification i.e. authenticating the identity of an individual. The software
uses human features for verification process.
1.1 BACKGROUND
OF THE STUDY
Biological verification system authorizes humans. It covers
issues such as how users are given an identity, the protection of that identity
and the technologies supporting that protection, the term identity is a more
abstract concept that will always be difficult to define in way that satisfies
everyone. It is a concept that is fluid and contextual depending on a number of
factors including culture. Thus the term management is appended to “identity”
to indicate that there is technological and best practice framework around a
somewhat intractable philosophical concept. Digital identity can be interpreted
as the codification of identity names and attributes of a physical instance in
a way that facilitates processing. In each organization there is normally a
role or department that is responsible for managing the scheme of digital
identities of their staff and their own objects. These represented by object
identities or object identifiers.
Historically, fingerprints have been
used as the most authoritative method of authentication, but recent court cases
in the US and elsewhere have raised fundamental doubt about fingerprint
reliability. Outside of the legal system as well, fingerprint have been shown
to be easily spoof able, with British Telecom’s top computer-security official
noting that “few” fingerprint readers have not already been tricked by one
spoof or another Hybrid or two-tired authentication methods offers a compelling
solution, such as private keys encrypted by fingerprint inside of a USB device.
In a computer data context, cryptographic methods have been developed which are
currently not spoof able if and only if the originator’s key has not been
compromised. That the originator (or anyone other than an attacker) knows (or
doesn’t know) about a compromise is irrelevant. It is not known whether these
cryptographically based authentication methods are provably secure since
unanticipated mathematical development may make them vulnerable to attack in
future. If that were to occur, it may call into question much of the
authentication in the past. In particular, a digitally signed contract may be
questioned when a new attack and the cryptography underlying the signature is
discovered.
1.2 STATEMENT OF THE PROBLEM
The recent increase in information security, problems
generated as a result of the inability of the manual system of information security
to disseminate information effectively and solution is offered in other to
improve the present situation of information system through the use of
security.
However, the problems of existing
(present) system are that it has the inability to disseminate between
authorized and unauthorized customer. Due to the above problems security men
find it difficult to known who is who, thereby causing insecurity even in the
presence of security. The above point is the problem of security.
1.3 RESEARCH QUESTIONS
INTERVIEW METHOD: - During the
interview conducted in the Department Economic and Financial Crime Control
Commission (EFCC). The research
interviewed the Head of the Division in Abuja of how Identification and
Biological verification is being carried out by the paramilitary organization
EFCC.
B) REFERENCES TO WRITTEN
DOCUMENT:- Inspite of the
interview took place in the Department Economic and Financial Crime Control
Commission (EFCC), the researcher extended her collection of data to the written
document as a result of inadequacy from the responsiveness of the
interview. The researcher had to visit
Ambrose Alli University Library for more information and references from
already written text on Biological Verification System varying more emphasis on
Crimes control system. The information
from this specified method made the successful completion of this study
possible.
1.4 AIMS OF
THE STUDY
With the
increasing anxiety regarding human factors in system development, the concepts
of humanized technology and human-related system have become the focus of more
and more research. Biological verification system has the potential to deliver
widespread automatic identification of individual by measuring particular
characteristics. However, when considering whether a system could add
significant benefit over alternative financial factors would need to e
examined.
1.5 OBJECTIVES OF THE STUDY
§ For privacy
and confidentiality
§ For
integrity, assuring that data are not modified without proper authority
§ Consistency,
ensuring that the data and behavior we see today will be the same tomorrow
§ Controlling
access to resources.
1.6 SCOPE OF THE STUDY
Biological verification system comprise of methods for
uniquely recognizing humans based upon one or more intrinsic physical or
behavioral traits. In computer science, in particular, biometrics is used as a
form of identity access management and access control. It is also used to
identify individuals in groups that are not related to the shape of the study.
Examples include, but are not limited to complexion, face recognition,
genotype, height, hand geometry, blood group, names etc.
1.7 SIGNIFICANCE OF THE STUDY
To maximize the benefit of technology to intelligence
operations, a large amount of information, on a large number of people,
collected over a long period of time would be needed. These raise civil
liberties issues. To address these,
clear criteria defining whose data can be collected, for what purpose, how long
it can be retained and who has access to it, need to be followed. The
importance of this system’ is to:
·
Access information by only authorized customer
·
Maintainability:
the proposed software meeting changing needs of crime
·
Dependability: the proposed software is trustworthy
·
Efficiency: the software does not waste time and human
resource
·
Usability: the software is usable by the users
(customer) for which it was designed
1.8 LIMITATIONS OF THE STUDY
Many factors act as limitation of the study; such factors
include the time limit given for the work to be completed, high cost of
transportation during the time research and also inadequate text book on the
course of the study.
1.9 DEFINITION OF TERMS
RISK: a risk is
a possible event which could cause a loss.
THREAT: a threat
is a method of triggering a risk event that is dangerous.
VULNERABILITY:
a weakness in a target that can potentially be exploited by a threat.
EXPLOIT: a
vulnerability that has been triggered by a threat – a risk of 1.0 (100%).
COUNTERMEASURE: a
countermeasure is a way to stop a threat from triggering a risk event.
DEFENSE IN
DEPTH: never rely on one single security measure alone
ASSURANCE: assurance
I the level of guarantee that a security system will behave as expected.
SECURITY: security is
the condition of being protected against or loss.
Login To Comment