Organization and business


The growing use of new technology in big government organization and business has important impact on the world nowadays. For that reason Metropolitan Police Service has to grant access to organization applications and other computing resources to user a group which includes MPS Officers, Police Staff, Police Community Officers and external contractors.

This all users require access of internal system and databases according to their authorization. Like in this type big originations staff people leave and join or when they will get promotion they move to on new post for that reason individual user system access permission is always changing according to requirements.


As shown in user lifecycle diagram during to employment time employee pass through promotion, name change, move location, employment status change, leave the job, during this life span Police Officers and Police Staff user different systems and application which normally generate multiple identities for the same police officer or staff person across different police departments and system applications.


In Metropolitan Police Service Organization staffs deal with highly sensitive database and information on daily basis. Managing this all sensitive data it's not only a problem but to manage there are multiple identities for an individual user also increase cost of data management, time consuming, and create security threats due to unused accounts when the account holder no more longer require to access it.

Instead of multiple ID, assign unique username and password to individual user to grant all internal organization application or implement other unique identification system like biometric identification. Single Unique Identification System reduces the IT support expenses and users don't have to remember many Ids

Single Unique Identity Management help in generally security and risk management as it's easy to manage employee's system access permission when employees join, leave or move to new post within the Metropolitan Police Organization. For security and audit departments it gives a secure centralised system of providing access control and authorisation in a controlled and auditable way. As financial view it gives good Return of Investment (ROI) which can be measured by decreasing unnecessary software licences and reducing staff support time and effort required.


Biometric is emerging method to uniquely identifying humans on the basis of fundamental natural behavioural or physical individuality. Main benefit of biometric indentifying technique is its base on human physical structural and behavioural which means it more secure and it's create unique identity. Biometrics techniques are mainly separated in two main roots: Physiological Biometric and Behavioural Biometric.

Physiological Biometric Identification is mainly related to human physical body shape. Face recognition, DNA testing, retina scanning, fingerprint scanning, hand geometry, iris scan these all Physiological base Biometric Identification Techniques.

Behavioural Biometric Identification is base on the human behaviour. Voice reorganization, static and dynamic signature verification typing rhythm and way of walking this all are behavioural biometric identification which also called a behaviometrics.


Biometric User Authentication techniques are helpful to prevent the sensitive data from the illegal access by authenticating users based on physiological and behavioural. In the Metropolitan Police Service Organization there are 30,000 officers and 15,000 Police Staff who works almost on daily basis. To manage this all staff authentication on workstation level the biometric techniques helpful to increase security of sensitive database and sensitive information. If we will use biometric identification techniques for this staff then it's easy to manage individual and group access permission from centralized identity management centre and when ever any person leave job that time the biometric identity data well destroyed so it will not grant to access data.

The biometric identification techniques accurateness is measured in the rate of false rejects and the rate of false acceptance. If we will take this measurement then Retinal Scan, Iris Scan and Fingerprints Scanning Identification is trustworthy compare to other biometric techniques. Retinal Scan Biometric has 1:10,000,000+ intersect identification accuracy when Fingerprints Scanning has 1:500 cross over accuracy. For that reason this two biometric techniques are helpful for strength and secure user authentication at the workstation level in MPS.


In the biometric authentication there are four main process step occupied: Image Capture by Scanning Device, Image recognition by standard algorithms, template creation by standard algorithm and finally fingerprint image matching by system application and standard algorithm.

During Fingerprint Identification process person place his or her figure on the figure print reader. There are several images taken by figure print scanner and it will compare with pre generated fingerprint image template. If Image template will get match then system give authentication to access system otherwise it denied to access.


Retinal Scan is the most secure biometric identification compare to other techniques because of not any particular technique or technology available with can able to create duplicate of the human retina. In the retinal scanning process low powered light and specialized sensor scan at the black of retina the unique pattern of blood vessels for identify individual person.

Please be aware that the free essay that you were just reading was not written by us. This essay, and all of the others available to view on the website, were provided to us by students in exchange for services that we offer. This relationship helps our students to get an even better deal while also contributing to the biggest free essay resource in the UK!