Research and prepare a report on your selection made in Week 2 on the current trend in the area of Biometrics.
Prepare a 6-8 page paper in Microsoft Word using approved APA format.
The minimum page count cannot not include your Title page and Reference list.
Include a Title page, Abstract/Introduction, Body of your paper, Conclusion/Findings and a Reference list.
Include a detailed description of the technologies and future trends involved in your selected area of research.
References (minimum 10 peer reviewed sources).
Use correct spelling and grammar.
APA formatting: Make sure that your references are cited in the body of your paper as well as in the Reference list.
Consular Consolidated Database and the Privacy and Security That Goes With It
This paper explores the biometric management system, Consular Consolidated Database (CCD), and how it functions. The topics include an overview of CCD, the privacy issues of CCD, and the security issues that CCD deals with.
Consular Consolidated Database and the Privacy and Security That Goes With It
The Consular Consolidated Database (CCD) is a biometric management system that is used by the United States Department of State and the information gathered from it is shared with federal, state, and local law enforcement as well as some foreign governments in order to maintain fingerprints and photographs of individuals who travel to and from the United States. Like all systems biometric or not, there are some security issues that the system has dealt with before as well as privacy issues that relate to the system due to the type of personal data and information of individuals.
Consular Consolidated Database (CCD)
The Consular Consolidated Database (CCD) is one of the largest data warehouses in the world. It holds current and archived data from the Consular Affairs (CA) domestic and post databases around the world. As of December 2009, it contains over 100 million visa cases and 75 million photographs, utilizing billions of rows of data, and had a current growth rate of approximately 35 thousand visa cases every day. It was created as a near-real time database in order to capture all international and domestic activity for the United States at home and abroad in response to the September 11th 2001 terror attacks. The three primary functions performed by CCD are: 1) supporting data delivery to approved applications via industry-standard Web Service queries, 2) providing users with easy-to-use data entry interfaces to CCD, and 3) emergency recovery/restoration of post databases. Authorized users utilize the CCD Portal to view the centralized data through a rich set of reports as well as to gain access to other applications. CCD serves as a gateway to the Automated Biometric Identification System (IDENT). IDENT is DHSâ€™ implementation of Commercial Off The Shelf (COTS) technology providing automated fingerprint checking in addition to integration with other Federal biometric systems. The CCD also serves as a gateway to the Department of State Facial Recognition system. (Department of State CCD Assessment)
CCD Privacy Issues
Various technical controls are in place to deter, detect, and defend against the misuse of personally identifiable information. This is referred to as a multilayered approach. Monitoring occurs from the moment an authorized user attempts to authenticate to the network. From that point on any changes (authorized or not) that occur to data are recorded. If an issue were to arise, administrators of the system would review (audit) the logs that were collected from the time a user logged on till the time they signed off. Ultimately it is very difficult to totally prevent an incident from occurring but by implementing a multilayered approach, risk can be greatly reduced. With the way the system is set up the privacy information that is held on the database is protected from theft or any change because the system constantly monitors and records the users who access the system. With this feature continuously running on the system the personal information is protected from editing and change however, it doesn?t protect against theft. (Department of State CCD Privacy Assessment)
CCD Security Issues.
After an internal review of the CCD by the State Department it was determined that the CCD, which is considered an ?unclassified but sensitive? database, is vulnerable to cyber-attacks. It is considered vulnerable because it is a critical source of information for the United States due to the fact that the system contains data from all individuals that have applied for a visa in the last 2 decades and the data is of a personal and biometric nature. It includes photographs, fingerprints, Social Security information, and additional personally identifiable information and could severely impact the lives of those who have their information in the database if it was ever compromised by a cyber-attack. While the system is vulnerable to cyber-attack State Department officials believe that the permissions required to do enough damage or cause theft of the data the would-be-hackers would have to find a way to give themselves the right level of permissions required to accomplish their goals. According to State Department officials it is very hard to exploit the vulnerabilities of the system because you have to have the right type and right level of permissions which is no easy task to obtain. The main concern of officials is that the CCD archive could have one of their vulnerabilities exploited and use that to doctor fake visa applications for terrorist groups. While this is a huge concern the State Department has said there is no information or evidence that the CCD system has been compromised or breached. (Homeland Security ? US Consular Consolidated Database Vulnerable to Cyber Attacks)
In today?s Information Age one of the main concerns with biometric systems is the privacy of the individual?s information and the security of that information and the database that holds the information. While the CCD system is not without vulnerabilities to be exploited, there are measures in place that prevent the unauthorized use, access, or theft of that data as well as a measure in place that monitors all activity on the database. This feature would ensure that even those who have access to the database don?t use it for nefarious means or goals. With all of these features and functions in place even if a theft or unauthorized access had occurred the system would be able to tell the authorities who accessed the system, what they did, and using that information they can find out why and arrest the person or people who participated and hopefully early enough to mitigate any concerns regarding the data theft.
â€œConsular Consolidated Database.â€ U.S. Department of State. U.S. Department of State, 15 July 2015. Web. 16 Oct. 2016.
Paganini, Pierluigi. â€œHomeland Security ? US Consular Consolidated Database Vulnerable to Cyber Attacks.â€ Security Affairs. Security Affairs, 06 Apr. 2016. Web. 16 Oct. 2016.
Our Service Charter
Excellent Quality / 100% Plagiarism-FreeWe employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
Free RevisionsWe keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
Confidentiality / 100% No DisclosureWe make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
Money Back GuaranteeIf the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
24/7 Customer SupportWe have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.