Technology Deployment Plan
Juan Ortega12/15/09NTS490
Small Private UniversityJustification/purpose to deploy biometrics:
The university decided to come to the 21’st century and upgrade the already implemented biometrics.
Newer biometrics devices have a higher accuracy rate. Access-control system Potential for newer biometric devices.
The new biometric devices will be used for in various facilities around the campus such as:
Resident HallsAthletic facilities Limit dining-hall access
Technology being implemented
Fingerprint RecognitionThe best biometric device to implement for this specific scenario would be fingerprint recognition.
Cheap Fast Small sized Low power Fairly
accurate Easy-to-use Number of ridges and valleys on the surface of
the finger. Ridges are the upper skin layer segments of the finger and valleys are the lower segments. The ridges form so-called minutia points ridge endings.The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points.
Fingerprint biometrics. Retrieved December 15, 2009 from biometricnewsportal Web site: http://www.biometricnewsportal.com/fingerprint_biometrics.asp
ModificationsBecause the previous biometric implementation happened in 1972, much of the installation, configuration, and operational processes will need to be modified for this new technology.The previous biometric
deployment policy would also need to change, but the main principles will remain, some of them are:
Public acceptability Practicality of capture Practicality of
deployment ROI
Biometrics Deployment of Machine Readable Travel Documents. Retrieved December 15, 2009 from aclu Web site: http://www.aclu.org/files/passports/TechnicalReport.pdf
Factors to Deployment1) Location of the centralized access-
control system.
2) Total cost and the ROI must be calculated.
3) Compatibility with the current infrastructure.
4) Regulatory
5) Operational
6) Training and user acceptance.
Identify individual taskswith the installation of equipment/software/hardware
1) Remove old biometric devices
2) Identify the locations where a biometric device is needed.
3) Depending on the device, some need to be screwed as a door handle, while others are just for identification.
4) If the devices are wireless, a wireless access point needs to be establish prior to the implementation.
5) Software for identification and verification needs to be installed.
6) Verification process begins to ensure all equipment and software is installed properly.
Finalize Installation Plan
Make sure everything's installed. Everything’s tested
Training Plan Initial user training for the
biometric.
Communication Plan Clear, timely and consistent
communication.
Schedule Maintenance
Other deployment documents Risk Assessment Deployment Design