Page 185 - Automated Fingerprint Identification Systems (AFIS)
P. 185

170  AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMS



                              the data integrity remains intact. It will also audit for any questionable use and
                              may terminate the agreement within a short time.
                                 Beyond the technological issues, what are the management issues that chal-
                              lenge interoperability? There are several, including foreign access to a data-
                              base, amount of transaction time for foreign inquiries, usage agreements,
                              indemnifications, security, firewalls, etc. All of these issues can be resolved with
                              time, money, and political drive. The following sections discuss some of these
                              management issues.


                              8.4.1 SECURITY

                              Whenever remote access to a database is considered, a primary concern is the
                              security of the information system and databases. As long as the system is a
                              closed system, or one in which access beyond the network is severely restricted,
                              security is manageable. Providing access to outside interests presents additional
                              threats, which come from access to the infrastructure as well as access to the
                              information.
                                 Just as with any network, expansion into foreign environments heightens the
                              need for “defense in depth.” The host agency must not only continue to ensure
                              its own system integrity, but must also ensure the integrity of participating agen-
                              cies and personnel.
                                 In the ATM example above, the security of the system is maintained by the
                              participating financial institutions. The identity of the card holder is confirmed
                              with the use of the debit card and the associated personal identification number
                              (PIN). However, since these transactions can be compromised, the financial
                              institutions limit the risk per transaction by limiting the amount of money that
                              can be electronically withdrawn.
                                 While the equipment and technology of the host agency may be standard-
                              ized and commercial off the shelf (COTS), the participating agency may have
                              customized hardware and software, and/or special protocols that need to be
                              reconfigured to be compatible with the host agency. Many related issues may
                              then arise, such as who will pay for the hardware and/or software changes nec-
                              essary to allow access to the host agency. Additional firewalls and anti-virus soft-
                              ware may have to be installed; new user codes and passwords have to be assigned
                              to the new personnel; training and audits are needed, etc. The cost can be sig-
                              nificant for each party. How can these expenses be justified in times of finan-
                              cial belt-tightening?
                                 In addition to the issue of security of the network is the security of the infor-
                              mation. Will the information be used for the intended purpose? Will the data
                              be safeguarded in the same spirit as at the host agency? What are the oppor-
                              tunities for misuse or abuse? A recent article on data sharing of a government
   180   181   182   183   184   185   186   187   188   189   190