SDC Assignment
SDC Assignment
SDC Assignment
Nitish Biradar-0920388
a) The Metropolitan Police Service is one UK’s most largest police force and more
than 45,000 people including police officers, staffs and community support officers.
In the MPS to keep track of the phone and fax lists which comes up to for almost
45,000 employees is a major task. Including this, almost all of MPS people need
some type of access to their internal systems and their databases, however by it's
using email or logging on to reporting systems. And, a people of this work size is
regularly elaborating, as staff may leave or join, or move to new posts this means
that they need the access to different systems.
For the MPS Role Based Access Control plays very important part in security,
RBAC is a technique to confine system access to user who are authorised there are
three main simple rules
3. Transaction Authorization : A class will able to accomplish tansaction only when the
transaction is authorised from class’s role membership and the class rule which can be
applied to users, roles and permission with the above (1) and (2) this rule makes sure
that user will be able to accomplish the task or transaction to which they are being
authorised.[ http://csrc.nist.gov/groups/SNS/rbac]
[Figure 1 reference Role based access control in advances in computer vol 46 bt sandhu and
ravi]
Mostly to the police officers and their staff work’s is related to the information which is
very sensitive and it’s important that only the authorised users have to access to it. The MPS
have to make sure that only a particular personnel can only can access the data they are
authorised to view and these permissions must be kept up to date. To manage all the data was
very costly, time consuming and also big administrative headache to the Metropolitan Police.
Because access to all its different sections internal security systems was controlled
autonomously by different sections departments, the MPS staff might regularly find
themselves to have to use dissimilar user names and passwords to access dissimilar aid on the
network. The MPS management has very big problem in handling this critical solution as
it might be very risky because each user was having four identity and the management might
not be knowing which user has which level of access to which information.
B) Biometrics refers to method for uniquely recognising human beings based upon physical
orbehavioural characteristics information technology, especially identity access management
and access control are form used by the biometrics. It is also used to recognise singleton in
batches that are directed under supervision. There are two types of biometric techniques
physiological which is related to shape and size of the body and behavioural which belongs to
the behaviour of the person. [http://en.wikipedia.org/wiki/Biometrics]
Biometrics play very important role in the MPS to strengthen user authentification,
without the biometric the security wont be that much good. Biometrics is considered as a
reliable solution for protecting a particulars identity and rights as it is recognised by unique
featuress. Biometrics techniques are used for mainly two authentication methods they are
Identification and verification. [Biometrics: A Further Echelon Of Security Siddhesh
Angle,Reema Bhagnani, Hemali Chheda]
Biometric has many advantages like it increases security to provide additional class of
security, minises the fraud by implementing very tough technologies like minimising fraud
for ID cards and by using physical attributes the problems of lost Id cards and forgotten
passwords eliminates and by reducing the administration costs and cost savings in such as
prevention of time and attendance, Also making possible to know automatically to know who
did what when and where. [http://www.questbiometrics.com]
when the police officers use latex gloves which is its specialised settings. The police
officer only need to put his finger on the scanner if its the authorised user and it matches its
veins then only it is authenticated it has very high accuracy when it is compared with its cost
as it it is very cost effective. From the security point of view fro the police officers it is the
ideal biometric technique.
When the police officer keeps his finger on the scanner an invisible infrared light works
through the finger and this light absorbs the haemoglobin of the blood in veins this unique
method capture the image by the sensor which is placed below the finger.[ Hitachi’s Finger
Vein Technology A White paper Ben Edgington May 2007 May 2007].
2. The image
1. In the MPS this pattern is also very usefull as veins will same throughout life an
image of one’s vein pattern will produced by the infrared light on their face, wrist
and hand. This pattern is very difficult to duplicate as it is a computerised
comparison of shape n size of the substantial blood vessel in the back hand. As there
is no physical contact is required and the blood vein is required so it is very secure
and performing is excellent and no degradation of performance even with scars and
0.4sec/person is the speed of the verification of the system the FAR and FRR is
0.0001% and 0.1% respectively. This pattern is less used at this moment, it is majorly
can be found because it is being used less till now the MPS should use this technique
because of its uniqueness. Only used by some established companies. [Biometrics: A
Further Echelon Of Security Siddhesh Angle,Reema Bhagnani, Hemali Chheda]
Digital identity should always refer to two concepts nyms and partial identities. And every
person has its own identity given by variety of authorities. Examples: passport, ID cards
beyond the physical presentation.
In the MPS the level of security will be different for different department and the access
also. When the police member will be in the police crime unit he will be having information
or access to all the criminal records For the police member who is in crime unit the biological
identity will the perfect secure because its related to physical aspect so that no one can access
his documents kept in his chamber or anywhere whereas if he uses the digital identity like
keeping passwords or keeping some zig zag photos as password an intelligent person can
access it and in case if the police member in crime department forgots his password than its
quite difficult to retrieve whereas in biological identity their is no way to forget his password
as its biological it may be vein, retina, iris etc.
Similarly for the normal police officer when he is not in crime department very high level
of security is needed digital identity will be enough as he wont be having very important
information. consider Swiping of ID cards might be enough for the normal police officers
who acts in particular context. When he will be crime department his security level will be
high because of his access to the crucial information which might be related to national level.
A crime department officer can work as crime officer and as well as normal police officer the
access level to information will be less.
D ) A client and server involves the secure transmission between sender and receiver using
the public and private keys to encrypt and decrypt the messages. Encryption is nothing but a
process of changing the text while sending so that the message should be not easy to read.
When sender and receiver want to use the public key encryption for transmission of
message both the parties will be having a shared key. when the sender sends a message to the
receiver with its shared key the receiver uses its copy of shared key to decrypt the message.
The private key encryption is not safer because anyone who has the copy of the shared key
can encrypt or decrypt it so both the sender and receiver will be watched as both can encrypt
or decrypt.
When the sender wants to share a secret message with the receiver using the public key
encryption, the sender ask the receiver for its public key,than later sender uses the public key
encryption. In this context only the reciever’s private key can decrypt the message,the sender
sends the message,receiver decrypts the message using its private key.This is reliable because
the receiver can give public key to anyone and and keep the private key as private for
decrypting messages.[ http://tldp.org/REF/INTRO/SecuringData-INTRO ]
For any security infrastructure the following has to be delivered to trusted transaction
between any client and server
1. Authentication
2. Confidentiality
3. Data integrity
4. Non-repudiation
PKI is asymmetric encryption, PKI ascertains the use of public key cryptography ,Yes
PKI is unbreakable because In Public Key Infrastructure its very hard ,when the sender
sends a secret message to encryption after asking the receivers public key only the receiver
can decrypt it using its private key. Yes the police should trust the cryptographic techniques
such as RSA which is Impossible to break the code it may take several 100 years to break the
code till than the technology will be very advance and some new technologies could have
been launched. [http://tldp.org/REF/INTRO/SecuringData-INTRO 5 ]
A CA gives the digital certificates those contain a public key and the identification of the
owner. The private key which is not made publicly available, buthas been kept secret by
the reciever who produced the key pair. The public key contained in the certificate belongs to
a particular person or sewrver or mentioned in the certificate.The CA’s main work is to
verify the applicants authorisation so that the users and dpending parties should trust the
information of the CA certificates.The CA is responsible to say that the said person is
genuine. If the user trusts than it can verify the signature of CA and the user can verify that
the public key belongs to the person who is identified by the certificate.
[http://en.wikipedia.org/wiki/Certificate_authority ]
References
1. http://csrc.nist.gov/groups/SNS/rbac
2. Role based access control in advances in computers volume 46 by sandu and ravi.
4. http://en.wikipedia.org/wiki/Biometrics
5. Biometrics: A Further Echelon Of Security Siddhesh Angle,Reema Bhagnani, Hemali
Chheda
6. http://www.questbiometrics.com
7. Hitachi’s Finger Vein Technology A White Paper Ben Edgington May 2007.
8. http://en.wikipedia.org/wiki/Digital_identity.
9. http://tldp.org/REF/INTRO/SecuringData-INTRO.
11. http://en.wikipedia.org/wiki/Certificate_authority.