SlideShare a Scribd company logo
City of Winter Park, Florida Biometrics and Authentication George Maldonado Systems Administrator MCSE, CCNA, MCP, Net+
Lets Define ! “ biometric: is a  physiological  or  behavioral  characteristic of a human being that can  distinguish  one person from another and that theoretically can be used for  identification  or  verification  of identity.” “ authentication: Positive  verification  of identity (man or  machine),  verification  of a person’s claimed  identity”  FBI CJIS Requires: That Each person who is authorized to store, process, and/or transmit FBI CJIS/CHRI  data must be authenticated by use of a unique user ID and password or a form of advance authentication. Advance authentication is required for devices that access FBI CJIS data/CHRI from non secure locations or via the internet, wireless or dial-in connections. Advance authentication is the term describing added security functionality, in addition to the typical use identification and authentication of login ID and password. Who are you?  Prove it.
Why Biometrics? Biometrics is the simplest and most inexpensive way to accurately identify or verify individuals based upon each person’s unique physical or behavioral characteristics. Biometrics work by unobtrusively matching patterns of live individuals in real time against enrolled records.   It fits the basic security principal: “ What You Have, What You Know, What You Are”  Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics in the enterprise wide network security infrastructure is a must technology, because single-factor authentication methods are easy to break and therefore inherently important to our citizens. Identity thefts  Something you know can be stolen Shared, predicted or hacked Fingerprints – mature enough to deter crime and even terrorism
Implementation Summary User Statistics Total Users: 545 Users with registered fingerprints: 364 Readers deployed: 364 City Hall Emergency Vehicles (Police and Fire Trucks) Electric Division & Water Plants Central Facilities including vehicle maintenance
Fingerprints as a Biometric High Universality A majority of the population (>96%) have legible fingerprints Even identical twins have different fingerprints (most biometrics fail) Individuality of fingerprints established through empirical evidence High Permanence Fingerprints are formed in the fetal stage and remain structurally unchanged through out life. High Performance One of the most accurate forms of biometrics available High Acceptability Fingerprint acquisition is non intrusive. Requires no training.  .
What We Are Using DigitalPersona Pro for Active Directory  Installed on desktops  Installed on existing servers Hardware DigitalPersona U.are.U 4500 fingerprint readers Existing “swipe readers” embedded in various models of popular notebooks and  PCs.
IT Environment (Past & Present) Current Environment Single Active Directory Domain Password Authentication Applications  Login to: Windows Domain or Network Access Naviline iSeries (AS400 Green Screen) Outlook Any application setup for biometric logon at the City will have this icon on the logon screen
Driving Forces Pain Points Resolve password related issues Needed Security that couldn’t be shared  Eliminated desktop sharing Excellent opportunity to put in place Password and screen saver Policies Meet CJIS Mandate Requirements Advance authentication is required for devices that access FBI CJIS data/CHRI from non secure locations or via the internet, wireless or dial-in connections. Advance authentication is required for devices that access FBI CJIS data/CHRI from non secure locations or via the internet, wireless or dial-in connections.
Available Solutions Solutions Considered  Inflexis DesktopID  Why other solutions were not selected  No real AD integration “ Petting” reader  No centralized fingerprint storage  No different than a token device  (can get expensive)
Why DigitalPersona Easy for Users  Employees embraced it Best trade off between convenience and security Faster than recalling and typing very complex passwords Intuitive to use – visual cues Simple user registration process Single Sign on function Automatic Wizard detects login fields in applications and web sites Easy for the IT Administrators  Easily create login templates for applications the Wizard cannot detect Push out the templates via GPOs
Why DigitalPersona Robust, Centralized Server Software  Tight Active Directory Integration Single or Two-factor authentication options Flexible Authentication Policies  Secure and Compliant Met CJIST mandate of requiring Two-Factor Authentication Event Logs of who accessed what and when Protect sensitive information through digital signing and encryption of email and documents Reader is well constructed
Implementation Summary Benefits to IT:  Met federal and state requirements Avoid fines and penalties Compliance’s intrinsic benefit Creates a more definitive baseline for data sharing and protection.  Improve security, communications, and overall business practices.  Create Flexible Group Policies
Implementation Summary CJIS Compliance Impact  Criminal Justice Information System FBI Requirement Two-factor Authentication Create and maintain criminal justice information system  For authorized state, local criminal justice, and noncriminal justice users  Supports operations, policy analysis, and public safety Must be accurate, timely, complete, appropriately secured to protect privacy rights, cost-effective, and accessible.
General Issues Low humidity areas may require hand moisturizer During initial set up, shield the fingerprint reader from direct sunlight
Thank You!! George Maldonado Systems Administrator MCSE, CCNA, MCP, Net+

More Related Content

What's hot (20)

PDF
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
Sierraware
 
PDF
SmartDevCon - Katowice - 2013
Petr Dvorak
 
PPT
Securing Citizen Facing Applications
edwinlorenzana
 
PDF
IAM: Getting the basics right
David Doret
 
PPTX
Intel IT's Identity and Access Management Journey
Intel IT Center
 
PDF
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Sierraware
 
PPTX
Identity and Access Management Introduction
Aidy Tificate
 
PPTX
Identity and Security in the Cloud
Richard Diver
 
PDF
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Sierraware
 
PDF
Digital documents & e-discovery
Prof. Jacques Folon (Ph.D)
 
PDF
Protecting Intellectual Property and Data Loss Prevention (DLP)
Arpin Consulting
 
PDF
Your Shortcut to BYOD Success
Sierraware
 
PPTX
Ivanti remote worker ds
Ivanti
 
PDF
The 2016 Guide to IT Identity Management
JumpCloud
 
PDF
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
PDF
Identity cues two factor data sheet
Hai Nguyen
 
PPTX
The Path to IAM Maturity
Jerod Brennen
 
PDF
Bring Your Own Device (BYOD)
Murray Security Services
 
PPTX
The Future of Mobile Application Security
SecureAuth
 
PDF
Mobile Authentication Interoperability using FIDO for Derived Credentials
Michael Queralt
 
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
Sierraware
 
SmartDevCon - Katowice - 2013
Petr Dvorak
 
Securing Citizen Facing Applications
edwinlorenzana
 
IAM: Getting the basics right
David Doret
 
Intel IT's Identity and Access Management Journey
Intel IT Center
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Sierraware
 
Identity and Access Management Introduction
Aidy Tificate
 
Identity and Security in the Cloud
Richard Diver
 
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Sierraware
 
Digital documents & e-discovery
Prof. Jacques Folon (Ph.D)
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Arpin Consulting
 
Your Shortcut to BYOD Success
Sierraware
 
Ivanti remote worker ds
Ivanti
 
The 2016 Guide to IT Identity Management
JumpCloud
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CloudIDSummit
 
Identity cues two factor data sheet
Hai Nguyen
 
The Path to IAM Maturity
Jerod Brennen
 
Bring Your Own Device (BYOD)
Murray Security Services
 
The Future of Mobile Application Security
SecureAuth
 
Mobile Authentication Interoperability using FIDO for Derived Credentials
Michael Queralt
 

Viewers also liked (12)

PDF
The story of joseph and egypt
Alexandria University, Egypt
 
PDF
The story of st. philomena prepared by dr. samir morcos rafla
Alexandria University, Egypt
 
ODP
用OpenOffice.org加速企業生產力!
imacat .
 
PPT
Friesen presentation
ifcaonline
 
PDF
Ecg commentary from saudi arabia 2004 white
Alexandria University, Egypt
 
PDF
Us national universities rankings
Alexandria University, Egypt
 
ODP
OpenOffice Application with Python
imacat .
 
PDF
Social Media, Metrics, Benchmark: Release 0.4 - My.ComMetrics.com
CyTRAP Labs (DE)
 
PPTX
Basic campus safety
latrese
 
PDF
Scientific news march 2015 samir rafla
Alexandria University, Egypt
 
PPTX
NEPBiS Presentation 2015 - DATA -FINAL
jimmyandshadow
 
PDF
Mozilla Vakfı
Murat ödünç
 
The story of joseph and egypt
Alexandria University, Egypt
 
The story of st. philomena prepared by dr. samir morcos rafla
Alexandria University, Egypt
 
用OpenOffice.org加速企業生產力!
imacat .
 
Friesen presentation
ifcaonline
 
Ecg commentary from saudi arabia 2004 white
Alexandria University, Egypt
 
Us national universities rankings
Alexandria University, Egypt
 
OpenOffice Application with Python
imacat .
 
Social Media, Metrics, Benchmark: Release 0.4 - My.ComMetrics.com
CyTRAP Labs (DE)
 
Basic campus safety
latrese
 
Scientific news march 2015 samir rafla
Alexandria University, Egypt
 
NEPBiS Presentation 2015 - DATA -FINAL
jimmyandshadow
 
Mozilla Vakfı
Murat ödünç
 
Ad

Similar to Biometrics and authentication webinar v3 (20)

DOC
13 biometrics - fool proof security
Srikanth457
 
PDF
Biometric - Solutions for Enterprises & Commercial banking
Suresh Babu
 
PPTX
Biometric security using cryptography
Sampat Patnaik
 
PPTX
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
PDF
MAIN_BIOMETRIC.pdf
20BAI017HarshVasisht
 
PPT
Seetu
seetumishra2511
 
PPTX
Password Problem - Solved!
Cyber Security Summit
 
PPTX
Privacy Implications of Biometric Data - Kevin Nevias
Kevin Nevias
 
PDF
Biometric System and Recognition Authentication and Security Issues
ijtsrd
 
PPTX
Biometrics fingerprint
Sagar Verma
 
PPTX
Hisplus Biometrics
Hisplus Systems Limited
 
PPT
Biometric Presentation
Anand Yadav
 
PDF
OWASP AppSec USA 2015, San Francisco
Clare Nelson, CISSP, CIPP-E
 
PPTX
Financial services 20150503
Clare Nelson, CISSP, CIPP-E
 
PDF
Access Control Presentation
Wajahat Rajab
 
PPTX
Bio-Metrics through finger print
University Of Education Lahore D.G Khan Campus
 
PDF
Two-factor authentication- A sample writing _Zaman
Asad Zaman
 
PDF
Case study on Usage of Biometrics (Cryptography)
Bhargav Amin
 
PPT
Biometrics
Alan Leewllyn Bivera
 
PDF
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
13 biometrics - fool proof security
Srikanth457
 
Biometric - Solutions for Enterprises & Commercial banking
Suresh Babu
 
Biometric security using cryptography
Sampat Patnaik
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
MAIN_BIOMETRIC.pdf
20BAI017HarshVasisht
 
Password Problem - Solved!
Cyber Security Summit
 
Privacy Implications of Biometric Data - Kevin Nevias
Kevin Nevias
 
Biometric System and Recognition Authentication and Security Issues
ijtsrd
 
Biometrics fingerprint
Sagar Verma
 
Hisplus Biometrics
Hisplus Systems Limited
 
Biometric Presentation
Anand Yadav
 
OWASP AppSec USA 2015, San Francisco
Clare Nelson, CISSP, CIPP-E
 
Financial services 20150503
Clare Nelson, CISSP, CIPP-E
 
Access Control Presentation
Wajahat Rajab
 
Bio-Metrics through finger print
University Of Education Lahore D.G Khan Campus
 
Two-factor authentication- A sample writing _Zaman
Asad Zaman
 
Case study on Usage of Biometrics (Cryptography)
Bhargav Amin
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Python basic programing language for automation
DanialHabibi2
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
AWS Chicago
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Python basic programing language for automation
DanialHabibi2
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 

Biometrics and authentication webinar v3

  • 1. City of Winter Park, Florida Biometrics and Authentication George Maldonado Systems Administrator MCSE, CCNA, MCP, Net+
  • 2. Lets Define ! “ biometric: is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity.” “ authentication: Positive verification of identity (man or machine), verification of a person’s claimed identity” FBI CJIS Requires: That Each person who is authorized to store, process, and/or transmit FBI CJIS/CHRI data must be authenticated by use of a unique user ID and password or a form of advance authentication. Advance authentication is required for devices that access FBI CJIS data/CHRI from non secure locations or via the internet, wireless or dial-in connections. Advance authentication is the term describing added security functionality, in addition to the typical use identification and authentication of login ID and password. Who are you? Prove it.
  • 3. Why Biometrics? Biometrics is the simplest and most inexpensive way to accurately identify or verify individuals based upon each person’s unique physical or behavioral characteristics. Biometrics work by unobtrusively matching patterns of live individuals in real time against enrolled records. It fits the basic security principal: “ What You Have, What You Know, What You Are” Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics in the enterprise wide network security infrastructure is a must technology, because single-factor authentication methods are easy to break and therefore inherently important to our citizens. Identity thefts Something you know can be stolen Shared, predicted or hacked Fingerprints – mature enough to deter crime and even terrorism
  • 4. Implementation Summary User Statistics Total Users: 545 Users with registered fingerprints: 364 Readers deployed: 364 City Hall Emergency Vehicles (Police and Fire Trucks) Electric Division & Water Plants Central Facilities including vehicle maintenance
  • 5. Fingerprints as a Biometric High Universality A majority of the population (>96%) have legible fingerprints Even identical twins have different fingerprints (most biometrics fail) Individuality of fingerprints established through empirical evidence High Permanence Fingerprints are formed in the fetal stage and remain structurally unchanged through out life. High Performance One of the most accurate forms of biometrics available High Acceptability Fingerprint acquisition is non intrusive. Requires no training. .
  • 6. What We Are Using DigitalPersona Pro for Active Directory Installed on desktops Installed on existing servers Hardware DigitalPersona U.are.U 4500 fingerprint readers Existing “swipe readers” embedded in various models of popular notebooks and PCs.
  • 7. IT Environment (Past & Present) Current Environment Single Active Directory Domain Password Authentication Applications Login to: Windows Domain or Network Access Naviline iSeries (AS400 Green Screen) Outlook Any application setup for biometric logon at the City will have this icon on the logon screen
  • 8. Driving Forces Pain Points Resolve password related issues Needed Security that couldn’t be shared Eliminated desktop sharing Excellent opportunity to put in place Password and screen saver Policies Meet CJIS Mandate Requirements Advance authentication is required for devices that access FBI CJIS data/CHRI from non secure locations or via the internet, wireless or dial-in connections. Advance authentication is required for devices that access FBI CJIS data/CHRI from non secure locations or via the internet, wireless or dial-in connections.
  • 9. Available Solutions Solutions Considered Inflexis DesktopID Why other solutions were not selected No real AD integration “ Petting” reader No centralized fingerprint storage No different than a token device (can get expensive)
  • 10. Why DigitalPersona Easy for Users Employees embraced it Best trade off between convenience and security Faster than recalling and typing very complex passwords Intuitive to use – visual cues Simple user registration process Single Sign on function Automatic Wizard detects login fields in applications and web sites Easy for the IT Administrators Easily create login templates for applications the Wizard cannot detect Push out the templates via GPOs
  • 11. Why DigitalPersona Robust, Centralized Server Software Tight Active Directory Integration Single or Two-factor authentication options Flexible Authentication Policies Secure and Compliant Met CJIST mandate of requiring Two-Factor Authentication Event Logs of who accessed what and when Protect sensitive information through digital signing and encryption of email and documents Reader is well constructed
  • 12. Implementation Summary Benefits to IT: Met federal and state requirements Avoid fines and penalties Compliance’s intrinsic benefit Creates a more definitive baseline for data sharing and protection. Improve security, communications, and overall business practices. Create Flexible Group Policies
  • 13. Implementation Summary CJIS Compliance Impact Criminal Justice Information System FBI Requirement Two-factor Authentication Create and maintain criminal justice information system For authorized state, local criminal justice, and noncriminal justice users Supports operations, policy analysis, and public safety Must be accurate, timely, complete, appropriately secured to protect privacy rights, cost-effective, and accessible.
  • 14. General Issues Low humidity areas may require hand moisturizer During initial set up, shield the fingerprint reader from direct sunlight
  • 15. Thank You!! George Maldonado Systems Administrator MCSE, CCNA, MCP, Net+