Select Currency
Translate this page

DESIGN AND IMPLEMENTATION OF BIOLOGICAL VERIFICATION SYSTEM FOR CRIME CONTROL

Format: MS WORD  |  Chapter: 1-5  |  Pages: 73  |  1777 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE FULL PROJECT

DESIGN AND IMPLEMENTATION OF BIOLOGICAL VERIFICATION SYSTEM FOR CRIME CONTROL
 
 
CHAPTER ONE 
 
INTRODUCTION 
 
1.1  BACKGROUND TO THE STUDY
 
Personal identification is ever present in our daily lives. For example we often have to prove our identity for getting access to bank accounts, entering a protected site, withdrawing cashing from an ATM machine, logging into a computer, and so on. Conventionally, we identity ourselves and gain access by physically carrying passports, keys, access cards or by remembering passwords, secret codes, and Personal Identification numbers (PINs). Unfortunately, passport, keys, access cards can be lost, duplicated, stolen, or forgotten; and password, secret codes and Personal Identification Numbers (PINs) can easily be forgotten, compromised, shared or observed. Such deficiencies of conventional personal identification techniques have caused major problems to all concerned. For example, hackers oen disrupt computer networks, credit card fraud is estimated at billions dollars per year worldwide. Therefore, robust, reliable and foolproof personal identification solutions must be sought in order to address the deficiencies of the conventional techniques, something that could verify that someone is physically the person he/she claims to be. A biological verification system is a unique, measurable characteristic or trait of a human being for automatically recognized or verifying identity. By using a biological identification, the individual verification can be done by doing the statistical analysis of biological characteristic. This measurable characteristic can be physical, e.g. eye, face, finger image and hand, or behavioural, e.g. signature and typing rhythm. Besides bolstering security, the systems also enhance user convenience by alleviating the need to design and remember multiple complex passwords.
 
In spite of the fact that automatic recognition systems based on fingerprints have been used by law enforcement agencies worldwide for over 40years, biological recognition continues to remain a very diicult pattern of recognition problem. Therefore, a proper system design is needed to verify a person quickly and automatically (Uludag et al 2004). In this project, a biological system is proposed for human verification i.e. authenticating the identity of an individual. The soware uses human features for verification process. Biological verification system authorizes humans. It covers issues such as how users are given an identity, the protection of that identity and the technologies supporting that protection, the term identity is a more abstract concept that will always be diicult to define in way that satisfies everyone. It is a concept that is fluid and contextual depending on a number of factors including culture. Thus the term management is appended to “identity” to indicate that there is technological and best practice framework around a somewhat intractable philosophical concept. Digital identity can be interpreted as the codification of identity names and attributes of a physical instance in a way that facilitates processing. In each organization there is normally a role or department that is responsible for managing the scheme of digital identities of their staff and their own objects. These represented by object identities or object identifiers. 
 
Historically, fingerprints have been used as the most authoritative method of authentication, but recent court cases in the US and elsewhere have raised fundamental doubt about fingerprint reliability. Outside of the legal system as well, fingerprint have been shown to be easily spoof able, with British Telecom’s top computer-security oicial noting that “few” fingerprint readers have not already been tricked by one spoof or another Hybrid or two-tired authentication methods oers a compelling solution, such as private keys encrypted by fingerprint inside of a USB device. In a computer data context, cryptographic methods have been developed which are currently not spoof able if and only if the originator’s key has not been compromised. That the originator (or anyone other than an attacker) knows (or doesn’t know) about a compromise is irrelevant. It is not known whether these cryptographically based authentication methods are provably secure since unanticipated mathematical development may make them vulnerable to attack in future. If that were to occur, it may call into question much of the authentication in the past. In particular, a digitally signed contract may be questioned when a new attack and the cryptography underlying the signature is discovered.
 
1.2  STATEMENT OF THE PROBLEM 
 
The recent increase in information security, problems generated as a result of the inability of the manual system of information security to disseminate information effectively and solution is offered in other to improve the present situation of information system through the use of security. However, the problems of existing (present) system are that it has the inability to disseminate between authorized and unauthorized customer. Due to the above problems security men find it difficult to known who is who, thereby causing insecurity even in the presence of security. The above point is the problem of security.
 
1.3  OBJECTIVES OF THE STUDY
 
With the increasing anxiety regarding human factors in system development, the concepts of humanized technology and human-related system have become the focus of more and more research. Biological verification system has the potential to deliver widespread automatic identification of individual by measuring particular characteristics. However, when considering whether a system could add significant benefit over alternative financial factors would need to e examined.
 
1. For privacy and confidentiality 
 
2. For integrity, assuring that data are not modified without proper authority 
 
3. Consistency, ensuring that the data and behavior we see today will be the same tomorrow 
 
4. Controlling access to resources. 
 
1.4 RESEARCH QUESTIONS 
 
INTERVIEW METHOD: - During the interview conducted in the Department Economic and Financial Crime Control Commission (EFCC). The research interviewed the Head of the Division in Abuja of how Identification and Biological verification is being carried out by the paramilitary organization EFCC. B) 
 
REFERENCES TO WRITTEN DOCUMENT:- Inspite of the interview took place in the Department Economic and Financial Crime Control Commission (EFCC), the researcher extended her collection of data to the written document as a result of inadequacy from the responsiveness of the interview. The researcher had to visit Ambrose Alli University Library for more information and references from already written text on Biological Verification System varying more emphasis on Crimes control system. The information from this specified method made the successful completion of this study possible. 
 
1.5 SIGNIFICANCE OF THE STUDY 
 
To maximize the benefit of technology to intelligence operations, a large amount of information, on a large number of people, collected over a long period of time would be needed. These raise civil liberties issues.To address these, clear criteria defining whose data can be collected, for what purpose, how long it can be retained and who has access to it, need to be followed. The importance of this system’ is to:
 
* Access information by only authorized customer 
 
* Maintainability: the proposed software meeting changing needs of crime 
 
* Dependability: the proposed software is trustworthy 
 
* Efficiency: the software does not waste time and human resource 
 
* Usability: the software is usable by the users (customer) for which it was designed.
 
1.6 SCOPE OF THE STUDY 
 
Biological verification system comprise of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are not related to the shape of the study. Examples include, but are not limited to complexion, face recognition, genotype, height, hand geometry, blood group, names etc. 
 
1.7 LIMITATIONS OF THE STUDY 
 
Many factors act as limitation of the study; such factors include the time limit given for the work to be completed, high cost of transportation during the time research and also inadequate text book on the course of the study. 
 
1.8 DEFINITION OF TERMS 
 
a risk is a possible event which could cause a loss. 
a threat is a method of triggering a risk event that is dangerous.
 
VULNERABILITY: a weakness in a target that can potentially be exploited by a threat. a vulnerability that has been triggered by a threat – a risk of 1.0 (100%). a countermeasure is a way to stop a threat from triggering a risk event.
 
DEFENSE IN DEPTH: never rely on one single security measure alone assurance is the level of guarantee that a security system will behave as expected. 
 
SECURITY: security is the condition of being protected against or loss.  

  DOWNLOAD THE FULL PROJECT

DESIGN AND IMPLEMENTATION OF BIOLOGICAL VERIFICATION SYSTEM FOR CRIME CONTROL

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON DESIGN AND IMPLEMENTATION OF BIOLOGICAL VERIFICATION SYSTEM FOR CRIME CONTROL INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Azeez Abiodun
Moshood Abiola polytechnic
I actually googled and saw about iproject master, copied the number and contacted them through WhatsApp to ask for the availability of the material and to my luck they have it. So there was a delay with the project due to the covid19 pandemic. I was really scared before making the payment cause I’ve been scammed twice, they attended so well to me and that made me trust the process and made the payment and provided them with proof, I got my material in less than 10minutes
Very Good
Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
Abdulrahman Jibrin
Nti Abaji
Nice one work prompt delivery tanx
Very Good
Adam Alhassan Yakubu
UDS
Excellent work and delivery , I promise to share my testimonies everyone in need of this kind of work. You're the best
Excellent
Abdulrazak Bello Marsha
Usman Dan fodio University
It was quite a better guide for project and paper presentation purpoting. Many thanks.
Average
Stancy M
Abia State University, Uturu
I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much iprojectmaster, infact, I owe my graduating well today to you guys...
Excellent
MATTHEW NGBEDE
Ahmadu Bello University
I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!
Excellent
Peace From Unilag
I cried not knowing how to go about my project but the day i searched online and saw iprojectmaster, i called and got my full project in less than 15minutes, i was shocked!
Excellent
Abdul Mateen Iddrisu
UDS
At first I taught is a site full of fraudsters until I saw my project in my Gmail after my payment.. THANK YOU IPROJECTMASTER and May God the almighty bless u guys abundantly
Excellent
Musa From Ahmadu Bello University
Thank you iprojectmaster for saving my life, please keep it up and may God continue to bless you people.
Excellent

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on DESIGN AND IMPLEMENTATION OF BIOLOGICAL VERIFICATION SYSTEM FOR CRIME CONTROL?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on DESIGN AND IMPLEMENTATION OF BIOLOGICAL VERIFICATION SYSTEM FOR CRIME CONTROL?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for DESIGN AND IMPLEMENTATION OF BIOLOGICAL VERIFICATION SYSTEM FOR CRIME CONTROL, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!