StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Metropolitan Police in Security - Essay Example

Cite this document
Summary
The aim of this essay is to answer several questions which include, Discuss current technologies that can be used by MPS to establish multiple identities associated with their different job roles to satisfy their requirements, what role might biometric techniques play in strengthening user…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Metropolitan Police in Security
Read Text Preview

Extract of sample "Metropolitan Police in Security"

Metropolitan Police in Security Introduction The Metropolitan Police Service (MPS) in United Kingdom is one of the largest police units in the country covering areas of over 620 miles full inhabited by over seven million residents. As a result, more than 30000 police officers and 15000 other support employees have been employed to ensure the unit meets her objective. The aim of this essay is to answer several questions which include, Discuss current technologies that can be used by MPS to establish multiple identities associated with their different job roles to satisfy their requirements, what role might biometric techniques play in strengthening user authentication at the workstation level by reviewing critically two named biometric techniques. In addition to that, the essay differentiates between biological and digital identity. Lastly, the essay will also look into the application PKI (Public Key Infrastructures) within the police unit. Question A The metropolitan police service has several identities linked to their current jobs. The identities include the amount of confidential data used, bunches, the emails and other police based identities. Therefore there is need to embrace modern technologies which will see them satisfy their requirements (CONANT & MOLZ, 2002). The requirement includes proper authorization of documents and information and adequate authentication of all information used in daily activities. Full-based authentication of the document will ensure that all information within the websites or Occurrence Book can be accessed countrywide from a single source. This means that different authorities can rely on single source security center for information. Currently, the modern technologies, which can be relied on, include RSA based authentication Management system where authentication based software is used by the police unit to manage all security based tokens, users, applications and multiple resources. The system has instrumentally helped in managing authentic based policies for the whole police unit. The system can also help the Metropolitan Police Service unit to meet flexibility, scalability and high level of efficiency. In most companies and especially the security-based organization such as G4S, the system has been found to be highly secure in protecting encryption of the information collected about cases and criminals. In addition to that, it has been argued that it is highly effective given that it applies the Novell based electronic directory. Moreover, it has been recently improved to have the oracle directory services (Moghaddam 2010). Secondly, we have the Oracle e-directory Services, which can help the police unit to improve the scalability and efficiency in which they can access criminal sites. This technology has been an improvement of the Novell based electronic directory, which the Metropolitan police service unit had been procuring from different suppliers in recent years. The oracle based electronic directory has also been found to improve the multi-purpose security based system (KIPPER, 2007). This means that metropolitan police unit can improve performance in her departmental unit through implementation of this system. However, the directory has been found to be less secure given that in previous companies, hackers have found it easy to break in. The main advantage of metropolitan police service using it is to create a web-based monitoring environment that is quite easy for administration. Some of the main features within the electronic based directory include; synchronization, proxy setting, virtualization and a centralized based management (Bahgat et al 2013). Third, another current technology, which can help the metropolitan police service, includes Novell electronic Directory. This technology embraced utilization of X.500 based directory services. This directory can help to meet the requirements of the police unit through centralization of all management-based units and resources such that all parties can fully utilized by all stakeholders in a manner as to reduce operation based costs. This means that all individuals are connected through computers where information can be relied from one central point to the others (European PKI Workshop, 2010). However, the greatest weakness of this system is that it can operate in different areas because it is not virtually connected. The directory has also been found to be highly resistant because it relies on a single login. This means that if no access to the login site, then there are chances for poor performance or delay. Therefore, it is not suitable in case of emergencies and long distance based communications (Malki, 2007). In addition to that, if the Metropolitan police unit decides to use this directory, then it will be forced to provide some LDAP back up which help in data based protection. However, there are many merits linked to the electronic based directory for instance it can improve authorization and authentication based form of requirements (Simon, & Gregory 2013). Moreover, other current technologies, which can help metropolitan police services in satisfying her requirement and meet efficiency, include; biometric data based capture system, the BDCs currently used in the United Kingdom based defense system. This system has been found to rely on capturing the fingerprint based information of the people before taking photos and matching them. This help in ensuring that real identity is tapped in the system meaning that it quite easy for the police officers to identify criminals. Lastly, the biometric data capture can also help to ensure that all data about the staff is authentically stored in all computers for future references. In summary form, there is need for Metropolitan police service unit to use some of these current based technologies in meeting her objective of proper authentication of all data based systems and quick authorizations of the document and confidential based information (Vacca 2007). Question B In case of a strong based authentication system within the work station, the metropolitan police service unit will be forced to ensure that biometric based authentication replaces the normal based authentication previously methods for instance; smartcards, password and other confidential based traditional techniques(Ratha, & Govindaraju 2008). Biometric involves capturing all information about the identity of the people such as fingerprints and images meaning that, the police unit will meet two objectives; improving identity chances of criminals and secondly, promote efficiency at which we can collect information about personal based fingerprints hence reduced time wastage (Hagan, 2010). Biometric authentication beat the logic of improved security performance because it does not rely on personal process such as passwords and smartcards, which can get lost in any, minute (National Symposium on Law Enforcement Science and Technology, 2010). Therefore, in summary form we can say that biometric authentication promotes efficiency by binding all parties to their specific based information. This is the reasons why companies and other security agencies are advised to rely on it for strong authentication. In short, it reduces time wastage; provide high level of data security and quick system base monitoring. Template-free biometrics based technologies are some of the latest technologies where the information collected get some mathematical based analysis before generating some keys which help in comparisons for easy criminal identification. The main two biometric techniques include Cancelable based Iris code. This technique involves a quick based scanning of the iris muscle next to the retina where we have blood vessels. The main use of iris is that it is unique, complex and remains unchangeable throughout one’s life. The mathematical analysis done can help in security matters (Defense Science and Technology Organization Edinburgh (Australia) Land Operations 2003) Secondly, we have the c where the people have registered their personal profile since their young age. Essentially, the person can be fully identified as he grows and therefore no worry. It is unique in that no two people in the world share same blood vein patterns just like fingerprints. Question C Biological identity is used to mean some physical characteristics of individuals, which can be used on the future to authenticate them. Essentially, the biometric based authentication help in ensuring that biological identity scenarios materialize. The main advantages of all biological based identification is that, it is difficult to change them over a given period of time as they include facial based information, retina, blood vessels such as veins technologies ,fingerprint and voice based recognitions(CONANT & MOLZ, 2002.). On the other hand, digital identity refers to the use of password, credit cards and personal identification numbers in collecting personal information. For those security agencies working on crime torn incidences such as metropolitan police service unit, there is need to rely on the biological based systems compared to the later because it cannot be changed easily. However, there are certain scenarios where it will be difficult to apply biological identity for instance in riots. Police officers will be forced to identify the criminal through digital systems such as smart cards. Therefore, it is good to assign the two identities for example digital will be highly effective in cost cutting (PITTMAN, 2009). The X.509 digital based certificates are essential in the biological based authentication scenarios. The certificate is mainly used in case of templates where the certificate can be adequately verified fully in most of the biometric based technologies. In private sector, it has been used by company to ensure that all information available is highly encrypted (American Association 2013). Question D The client based server managing system in metropolitan police service unit will play a vital role. It is vital because if accessed, a lot of information on security matter can be leaked or destroyed by the attackers. This has been witnessed in cyber café where most of the criminal activities take place. PKI provides adequate authenticity integrity and information based confidentiality. Essentially, it calls for encryption which help in ensuring that mathematical coding are made to meet data based exchanges before changed to unreadable format for private based storage. The police should trust the cryptographic techniques (such as RSA) that are used as an integral part of PKI because the information is highly kept in encrypted manner to avoid any leakage. However, the companies are currently being encouraged to use the certificates instead of the PKI because the PKI has severally been attacked and information lost. Reference List American Association. 2013. PKI Assessment Guidelines: Guidelines to Help Assess and Facilitate Interoperable Trustworthy Public Key Infrastructures. Chicago, Ill.: American Bar Association. Conant, R. W., & Molz, R. K. 2002. The Metropolitan Library. Cambridge, Mass: MIT Press. Conant, R. W., & Molz, R. K. 2002.The Metropolitan Library. Cambridge, Mass: MIT Press. Defense Science and Technology Organization Edinburgh (Australia) Land Operations Div, Blackburn, T., Butavicius, M., Graves, I., Hemming, D., & Ivancevic, V. 2003. Biometrics Technology Review 2002. European PKI Workshop, Martinelli, F., & Preneel, B. 2010.Public Key Infrastructures, Services And Applications: 6th European Workshop, Europki 2009, Pisa, Italy, September 10-11, 2009: Revised Selected Papers. Berlin: Springer. Hagan, F. E. (2010). Crime Types and Criminals. Thousand Oaks, Calif: Sage Publications. Kipper, G. (2007).Wireless Crime and Forensic Investigation. Boca Raton, Fl: Auerbach Publications. Malki, Suleyman, & Spaanenburg, Lambert. 2007. Veins Feature Extraction Using Dt-Cnns - Art. No. 65900n.Spie--The International Society for Optical Engineering. Moghaddam, F. M. 2010. The New Global Insecurity: How Terrorism, Environmental Collapse, Economic Inequalities, And Resource Shortages Are Changing Our World. Santa Barbara, Calif: Praeger Security International/ABC-CLIO. National Symposium on Law Enforcement Science and Technology, Cohn, S. I., & McMahon, W. B. 2010.Law Enforcement Science And Technology Iii: Proceedings Of The Third National Symposium On Law Enforcement Science And Technology. Chicago: ITT Research Institute. Pittman, J. A. 2009. A Study of Professional Development, Research, Practices, and Policies to Prepare In-service Teachers in New Technologies Implications for Training Standards in New Technologies. Thesis (Ph. D.)--Iowa State University, 2009. Ratha, N. K., & Govindaraju, V. 2008. Advances in Biometrics: Sensors, Algorithms and Systems. London: Springer. S.F. Bahgat, S. Ghoniemy, & M. Alotaibi. 2013. Proposed Multi-Modal Palm Veins-Face Biometric Authentication. The Science and Information (SAI) Organization. Simon, M. A., & Gregory, P. H. 2013. Biometrics for Dummies. Hoboken, N.J: John Wiley & Sons. Vacca, J. R. 2007. Biometric Technologies and Verification Systems. Boston, Ma: Butterworth-Heinemann/Elsevier. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Metropolitan Police in Security Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1663999-metropolitan-police-a-case-study-in-security
(Metropolitan Police in Security Essay Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/information-technology/1663999-metropolitan-police-a-case-study-in-security.
“Metropolitan Police in Security Essay Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/information-technology/1663999-metropolitan-police-a-case-study-in-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Metropolitan Police in Security

How the Metropolitan Police Service Benefit from International Relations

How the metropolitan police service benefit from international relations instructor Course Institution Date How the metropolitan police service benefit from international relations Introduction.... Despite the many merits of international relations, there is apparently no documented study on how the metropolitan police service benefit from international relations.... In attempts to cover the gap in prior studies, this paper proposes a research to investigate how the metropolitan police service benefit from international relations....
10 Pages (2500 words) Essay

Solving Problems of Multiple Identities

Problems of multiple identities within the metropolitan police Service can only be solved through an effective identity management system that utilizes various technologies.... Claims-based identity could be used by the metropolitan police Service as a way of applications for acquiring identity information required for every individual working for the police service within the area.... MPS could find this technology useful since it provides an approach, which is consistent for the applications that are running on the metropolitan police Service premises as well as in the internet cloud....
8 Pages (2000 words) Essay

Cultures and Traditions of Various Countries

These groups are known as the metropolitan police Force Patrol and the City of London Police.... A department of peace and security that holds almost similar mission objectives and goals when it comes to the protection of the immediate population of the residents of a certain country.... “NYPD”) Due to the vast size of the city, the manpower the New York police department sometimes comes up short in terms of visible security but due to the community partnership that exists between the police department and the community leaders, New York City has become one of the safest cities in the world, more so after the terrorist attacks of 9/11....
7 Pages (1750 words) Research Paper

The Metropolitan Police Service

The paper "The metropolitan police Service" highlights that care must however be taken to ensure that these partnerships help both organizations in meeting their goals and objectives and that none of the agencies benefits at the expense of the other.... The metropolitan police stated its operations in September 1829 albeit with some resistance from certain quarters of the community who were of the view that it would threaten their 'civil liberties.... he metropolitan police Service has several departments including Information, Standards and Intelligence, Human Resources, Strategy and Modernisation and Performance departments....
6 Pages (1500 words) Essay

Ethics, wk 6, forum

ommunity policing strategies do create organizational ethical behavior because they empower the police to choose between right and wrong, to improve the security of the community and to overall make public security a priority.... Traditional policing is the practice in which police handles crimes once it has occurred.... In regard to this,… It is a proactive approach in which police works with other community members to indentify the root causes of a crime and to deal with it before hand rather than addressing it once it has occurred....
2 Pages (500 words) Essay

Disaster Management Paper 1.4

Internal actions to be incorporated in the plan will include evacuation plan, fire protection plan, safety and health program, security procedures, insurance programs and employees manual.... a Internal actions plan Internal actions to be incorporated in the plan will include evacuation plan, fire protection plan, safety and health program, security procedures, insurance programs and employees manual.... security procedures enhance security and the whole preparedness to thwart, react and recover from the underlying acts of catastrophe....
2 Pages (500 words) Essay

Evolution of the UK Police Force from 1829 till Present

The turn of the nineteenth century also witnessed the establishment of the Thames River police in the year 1800.... nbsp;  The Justices of the Peace in England were assisted by constables and security guards over the course of a few centuries.... The state machinery responsible for maintaining law and order found itself in a difficult position and the seriousness of the situation demanded that dramatic and important changes had to be made in order to improve public security....
11 Pages (2750 words) Coursework

Metropolitan Police Service

… The paper "metropolitan police Service" is a wonderful example of an assignment on information technology.... The paper "metropolitan police Service" is a wonderful example of an assignment on information technology.... In determining the best kind of technology to use to manage user identities, organizational leadership has to identify factors such as different kinds of data, the possible variety of identity stores, the levels of employees who access such systems....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us