BlogguideBiometric System Assignment

July 23, 2021by Dataman0

Hits: 0

Biometric System Assignment  Privacy issues related to Biometric devices

Biometric devices are designed to verify and identify the identity of people through the use of behavioral characteristics and intrinsic physical. The identifiers of biometric systems include iris fingerprints, voice, DNA, and palm prints. Biometric devices provide much compelling identification and individual verification solutions. The device helps in satisfying the desire of consumers in terms of security and convenience while transacting online. In addition, biometric systems are becoming more sophisticated and accurate; for instance, Apple has a facial recognition system on the iPhones that can project 30,000 infrared dots on the face of a user to authenticate the pattern of matching (Porr, 2020). Therefore, the chance of mistaken identity is very rare.

Security issues of biometric devices revolve around capturing sensitive information, storage, transmission, accessibility, and processing. Biometrics have privacy risks since the government can use them for surveillance. If hackers get an opportunity to access biometric data, they can steal the identity of people and tamper with their private information, which is detrimental to an individual’s life. There are numerous ways in which hackers can access biometric data with no or little attention. For instance, using CCTV cameras in tracking people using facial recognition has been an issue concerning the blurring boundaries between surveillance and security. Lastly, storing and transmitting data is one way that makes the data vulnerable, and hackers are actively targeting databases, steal the data and breach the system (Deliversky & Deliverska, 2018). System misconfiguration and sensor inaccuracy are indicators of cybercrimes in the system. Biometric System Assignment

 

LEED certification process

Leadership in Energy and Environmentally Responsible Design (LEED) certification is simply a thing that helps one to be environmentally responsible and prove it. It initiates from U.S Green Building Council and utilizes a point-scoring system for certification of constructing one of the four-level: certified, silver, gold, and platinum. Every construction project gains points based on how it will comply with the LEED standards. Evaluation of construction is based on water efficiency, sustainable sites, resources and materials, indoor environmental quality, and energy and atmosphere.

There are various steps involved in acquiring the certification. First, begin budgeting for certification since it is not for free (Burger, 2017). The minimum charge for LEED certification is $2,900.  The second thing is identifying an individual’s target certification level since it is part of the design stage and information entered into the construction management software. The other stage is to seek LEED competent people like engineers and planes who are knowledgeable about LEED certification. At this stage, register and make a LEED certification application online. A pot of gold at the last part of the rainbow is the certification. Based on the points the project has gained, it may get a certified, silver, platinum, or gold rating.

LOPA process from a residential perspective

LOPA refers to a layer of protection analysis used to evaluate certain risks scenarios and in this particular study from the residential perspective. Evaluating risk scenarios occurs when LOPA develops a comparison with a tolerance procedure to know whether the safeguards in place are satisfactory or there is a need for more measures. LOPA process is conducted as an entire PHA process or a partial PHA (Sutton, 2015). Independent Protection Layers (IPLS) address LOPA used to assign probabilities of failure since the frequency of a particular scenario is the one used to determine the combination of both probabilities. If the combination of the scenario is determined by other elements, then it is used to determine the probability of other scenario risks.

In summary, the LOPA process begins with the identification of the consequence (PFD). The other step is to identify the IPLS in order to determine PFD and the frequency of mitigates consequences. Finally, it is an evaluation is conducted to determine whether there is a need for additional IPL. Biometric System Assignment

 

Biometric System Assignment

 

 

 

 

 

 

 

 

 

 

References

Burger, R. (2017). A step-by-step guide to achieving LEED certification. The Balance Small Business. https://www.thebalancesmb.com/a-step-by-step-guide-to-achieving-leed-certification-845316

Deliversky, J., & Deliverska, M. (2018). Ethical and legal considerations in biometric data usage—Bulgarian perspective. Frontiers in Public Health6https://doi.org/10.3389/fpubh.2018.00025

Porr, P. (2020). The fear of biometric technology in today’s digital world. CPO Magazine. https://www.cpomagazine.com/data-privacy/the-fear-of-biometric-technology-in-todays-digital-world/

Sutton, I. (2015). Layer of protection analysis. ScienceDirect.com | Science, health and medical journals, full text articles and books. https://www.sciencedirect.com/topics/earth-and-planetary-sciences/layer-of-protection-analysis

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *