Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
050711 Thesis Msit

050711 Thesis Msit

Ratings: (0)|Views: 12|Likes:
Published by Elisabeth de Leeuw

More info:

Published by: Elisabeth de Leeuw on Oct 13, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/13/2013

pdf

text

original

 
Biometrics in National Identity Management Elisabeth de Leeuw - Lecoeur 23-10-2008 - 15:05 page 1 of 46
RISKS AND THREATS
 Attached to the application of 
BIOMETRIC TECHNOLOGY
In
NATIONAL IDENTITY MANAGEMENT
Elisabeth de Leeuw - Lecoeur Thesis submitted in fulfilment of the requirementsFor the degree of Master of Security in Information Technology At the TIAS Business SchoolEindhoven and Tilburg AMSTERDAM, OCTOBER 2004
 
Biometrics in National Identity Management Elisabeth de Leeuw - Lecoeur 23-10-2008 - 15:05 page 2 of 46
TABLE OF CONTENTS
I - INTRODUCTION.................................................................................................................3CHAPTER 1 – BACKGROUND...............................................................................................3The role of national identity management...........................................................................3 An approach to policies on national identity management................................................3CHAPTER 2 – INTERNATIONAL AND NATIONAL PROPOSALS........................................3International proposals.........................................................................................................3
The International Civil Aviation Organisation (ICAO)...........................................................3United States.......................................................................................................................3European Community..........................................................................................................3
Dutch proposal.......................................................................................................................3Scope of this thesis...............................................................................................................3CHAPTER 3 – RESEARCH.....................................................................................................3Question.................................................................................................................................3 Approach................................................................................................................................3II – THEORY, FACTS AND FIGURES.....................................................................................3CHAPTER 4 – THEORY OF BIOMETRICS AND NATIONAL IDENTITY MANAGEMENT.....3Biometrics..............................................................................................................................3
Biometrics basic concepts................................................................................................3General criteria for biometric features..................................................................................3Types of biometric features..................................................................................................3
Identity....................................................................................................................................3
Elements of identity.............................................................................................................3Identity versus national identity............................................................................................3
 A definition of identification, authentication and verification............................................3National identity management..............................................................................................3
Basic concepts....................................................................................................................3Schematic overview.............................................................................................................3National identity management and biometrics.....................................................................3
CHAPTER 5 – FACTS AND FIGURES ON NATIONAL IDENTITY MANAGEMENT..............3The quality of national identity management.......................................................................3Fraud in national identity management................................................................................3
The phenomenon of fraud is a blind spot by definition.........................................................3Fraud, look alike fraud in particular, is on the agenda..........................................................3Identity fraud is perceived by the government as an external risk........................................3
 
Biometrics in National Identity Management Elisabeth de Leeuw - Lecoeur 23-10-2008 - 15:05 page 3 of 46
Identity fraud is extensive and increases rapidly..................................................................3
Conclusions Chapter 5..........................................................................................................3CHAPTER 6 – BIOMETRICS: FACTS AND FIGURES...........................................................3Performance of biometric technology..................................................................................3
Performance indicators and criteria for success..................................................................3Factors influencing the performance of biometric technology..............................................3Performance in large-scale applications..............................................................................3Performance in groups of look alikes...................................................................................3
Secure development and implementation...........................................................................3Conclusions Chapter 6..........................................................................................................3III - TACTICAL CONSIDERATIONS........................................................................................3CHAPTER 7 – BIOMETRICS IN NATIONAL IDENTITY MANAGEMENT...............................3Current issues in the application of biometrics..................................................................3
Mandatory versus voluntary application of biometrics..........................................................3Domestic versus international application of biometrics.......................................................3
Examples of the application of biometrics in national identity management...................3Conclusions Chapter 7..........................................................................................................3CHAPTER 8 – BIOMETRIC FEATURES IN CURRENT US AND EU PROPOSALS..............3Performance criteria for supervised passage......................................................................3Performance of biometric technologies...............................................................................3
Laboratory performance of biometrics against criteria for supervised passage....................3Impact of sex, race, age and psychology on the performance of biometrics........................3Performance of biometrics in a population of look alike frauds............................................3Effectiveness of biometrics in national identity management...............................................3
Conclusions Chapter 8..........................................................................................................3IV - STRATEGIC CONSIDERATIONS.....................................................................................3CHAPTER 9 – BIOMETRICS IN NATIONAL IDENTITY MANAGEMENT...............................3The logic of identity documents...........................................................................................3The logic of biometrics..........................................................................................................3Conclusions Chapter 8..........................................................................................................3CHAPTER 10 – RISK ATTACHED TO THE APPLICATION OF BIOMETRICS IN NATIONALIDENTITY MANAGEMENT......................................................................................................3 Attacks and attack scenario’s...............................................................................................3Types of attacks.....................................................................................................................3

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->