The Impact of IT on Security Systems - PowerPoint PPT Presentation

1 / 26
About This Presentation
Title:

The Impact of IT on Security Systems

Description:

Traditional security and access devices still depend heavily on ... Example: Wynn Casino: utilizes a fully integrated video surveillance and security system. ... – PowerPoint PPT presentation

Number of Views:36
Avg rating:3.0/5.0
Slides: 27
Provided by: Jede5
Category:

less

Transcript and Presenter's Notes

Title: The Impact of IT on Security Systems


1
The Impact of IT on Security Systems
  • Ina Chen
  • Maggie Lam
  • Miri Lee
  • Jed Thompson
  • Shuki Yuen

2
Traditional Systems
  • Traditional security and access devices still
    depend heavily on what we have (keys, cards)
    and what we know (personal identification
    numbers, or PIN).
  • Chances to loss and abuse.

3
(No Transcript)
4
Biometrics
  • Biometrics relies on what we are.
  • The first fingerprint biometrics system was
    introduced about 30 years ago
  • Security-sensitive organizations are among the
    early adopters.
  • In the biometrics market, hand geometry and
    fingerprint scans are the most commonly deployed
    solutions.
  • Iris identification technology
  • Digital and sonar fingerprints
  • Hand geometry
  • Retina eye patterns
  • Digital facial recognition
  • Voice recognition
  • Database technologies

5
Breakdown of biometric market
6
Vascular Pattern Scanner
7
Biometrics used by Governments
  • e-Passports
  • An e-Passport has this international symbol on
    the cover.
  • An e-Passport contains an electronic chip.
  • The chip holds the same information that is
    printed on the passport's data page the holder's
    name, date of birth, and other biographic
    information.

8
Benefits of an e-passport
9
Customs
  • The Government of the Hong Kong Special
    Administrative Region has been issuing smart
    identity (ID) cards to replace the old ID cards.
  • Each smart ID card is with a computer chip
  • Immigration Applications
  • e-Channel
  • http//www.youtube.com/watch?vZ0MCAXo0NU0
  • Airport Security
  • Future Security in airports
  • Millimeter Wave device
  • CCTV cameras

10
Diagram of airport security
11
Home Security Systems
  • Home Burglar Alarms
  • Home Fire Alarms
  • Home Carbon Monoxide Alarms
  • Notifications for non-alarm events

12
Home Security Systems
  • Statistics

13
Home Security Systems
  • Motion Detectors
  • CCTV surveillance
  • Electronic Pet Doors
  • Biometrics

14
Businesses Security
  • Businesses have to protect themselves from many
    threats ranging from viruses, worms, and
    hardening the perimeter from external attacks.
  • Trend for Businesses to adopt IP integration of
    all security systems.
  • Effect of Breaches in security on businesses.
  • Systems most widely used in Business industry
  • (CCTV) Closed Circuit Television
  • Facial Recognition
  • IP integration
  • Behavioral Recognition
  • Access controls, Biometrics
  • (RFID) Radio Frequency Identification
  • Smart Cards

15
Surveillance
  • CCTV use of video cameras that transmit their
    signal to a limited set of monitors.
  • CCTV Traditional use.
  • Comparison to Analog
  • Analog video uses tapes that have to be swapped
    at regular time intervals.
  • Limits video quality and replay analysis, and
    requires more labor to maintain the system.
  • IP Integration
  • Network video surveillance 30 of security
    professionals now use IP-based cameras and an
    additional 45 plan to purchase IP-based cameras
  • Allows for automated reactions and more efficient
    security operation.
  • Can tag video with information from other
    security systems.

16
Facial Recognition Software
  • How it works
  • The software calculates hundreds of different
    measurements of the face.
  • Results of calculations is a mapped face which
    then can be compared to other faces in a
    database.
  • Identifies the probable matches along with
    physical characteristics, aliases among other
    information
  • Facial Recognition Software
  • Helps government agencies and casinos sort
    through a wide assortment of possible security
    threats.
  • Companies and agencies using this technology are
    the US Department of Defense, Airports around the
    world, and more than 100 casinos like MGM Mirage,
    The Stratosphere and Trumps hotel and casino

17
Casino Security systems
  • Modern day security is divided between the
    physical security composed of people that patrol
    the floor and a surveillance department known as
    the eye in the sky.
  • Electronic security in casinos Video Systems,
    RFID, IP integration, CCTV surveillance, Vaults,
    door way detectors
  • Threats to casinos counterfeit money, counterfeit
    chips, employee theft etc..
  • One of the largest threats is having the
    electronic security system compromised by
    hackers, viruses or employees.
  • Example Wynn Casino utilizes a fully integrated
    video surveillance and security system.

18
Casino Security
  • Impact of IP integrated security system and
    Facial recognition
  • As an example, the Stratosphere after integration
    of security systems cut their losses by 90
    percent.
  • In addition also reduce labor cost

19
Bank Security system
  • Traditionally Banks used to rely on safes, vaults
    and security guards to secure their customers
    money.
  • The banking industry physical security system is
    core to operations.
  • Utilize CCTV with facial recognition
  • IP security system for access controls, alarms,
    video surveillance
  • Threats in the banking industry
  • Robbery reported that in 2004 that 7556
    robberies occurred to institutions like
    commercial banks, credit unions, mutual savings
    and armored carrier companies.
  • Fraud in 2006 more than 8.4 million Americans
    became the victim of fraud amounting to 49.3
    Billion.
  • Most identity theft or fraud results from the
    loss of a purse or wallet, but as the internet
    continues to evolve other methods of obtaining
    customer information and intellectual property
    emerged.
  • Phishing
  • Man in the middle
  • Spyware/Trojan horse
  • Many hacker attacks are originating from Eastern
    Europe, Russia, and China which makes it
    difficult to prosecute the hackers that are
    caught.

20
Online Banking Security
  • Conventionally Banks use a PIN or a TAN
    (Transaction authentication number.)
  • To help combat this problem a new TAN system was
    developed called iTan. In this system TAN numbers
    are indexed and attach the index number to the
    specific transaction to be made.
  • Further Security is needed for online banking.
  • Cryptographic calculator
  • Software certificate
  • SSL/Web browser

21
Biometrics used in banks
22
Fingerprint in Banking
  • Biometrics used Fingerprints, signature, vein
    pattern, hand geometry, voice recognition, facial
    recognition
  • Fingerprint is the most commonly used Biometric
    in the banking industry
  • It is used in almost all areas of the banking
    industry
  • Transaction security
  • Network security
  • Access controls
  • Background checks
  • Trend in banks to enable their clients to
    authenticate themselves before making
    transactions through fingerprint authentication.
  • Fingerprint authentication will be used in the
    banks for employees before they access the
    system, at ATMs, the Kiosk and online.
  • The transition to biometric authentication leads
    to increased security for both the companys and
    the customer, convenience, reduce required man
    power.

23
Security Industry
  • At the end of 2005 the security industry created
    revenues over 150 billion.
  • The Security Industry is expected to have about
    an 12 in 2008 and maintain 9 percent growth
    through 2010
  • Biometrics has experienced an annual increase of
    40.2 since 2004
  • System integration sector has been growing at an
    annual rate of 15
  • CCTV is expected to grow at an annual rate of 15
    is driven by internet, networking, biometrics and
    integration of all security systems.
  • Growth of convergence of IT with physical
    security driven by digital technology seen in
    access controls, biometrics, RFID, Smart Cards,
    ID management and video surveillance.
  • Major identity breaches and confidential data
    loss continue to fuel the need for identity
    management and protection.

24
Break down of security industry by revenue
25
Impact of Security
  • The increasing need for security has caused a
    dramatic increase in the value of information as
    an asset.
  • With technology constantly changing and new
    business infrastructures emerging there are new
    vulnerabilities being exposed.
  • Creation of a white list.
  • Rising issues of public privacy vs. public
    surveillance
  • Future of security.

26
Questions?
Write a Comment
User Comments (0)
About PowerShow.com