8) This describes the essential skills and knowledge and their level, required for this unit. Evidence shall show that knowledge has been acquired of safe working practices and developing biometric system installation, instructions and validating requirements of biometric systems. All knowledge and skills detailed in this unit should be contextualised to current industry practices and technologies. KS01-ED155A Biometrics and Security Evidence shall show an understanding of biometrics equipment techniques and applications and biometric and security to an extent indicated by the following aspects: T1 Technology applications used in forensics, genetics, civil and commercial environments and government departments for verification of identities, encompassing: Fingerprint matching Palm Print Hand Geometry Face Verification Iris Recognition Retina Scan Note. Examples of biometrics equipment technology used including scanning and digitizing of samples, enhancement of captured data, feature extraction, classification, matching, searching and manual verification T2 Technical principles, parameters, and processes underpinning each of the above technologies in identity recognition T3 Typical selection, evaluation and testing criterion and methods of biometrics equipment, encompassing: comparative features of selection, evaluation and testing methods of various classes of equipment vendor claims, product suitability and product specifications T4 Compliance requirements for implementing security on personal computers and computer networks T5 Compliance requirements for securing voice over the internet T6 Compliance requirements for assuring IT network security and capital planning measures encompassing: security risks versus investment risks, investment management life cycle capital management and investment control alternatives and budget analyses of IT security T7 Security implementation encompassing: biometrics in law and relationship with legislation trusted networks, cryptography and data security characteristics advanced authentication, digital certificates and digital signatures cost comparison and evaluative analysis T8 Laws, standards and compliance guidelines encompassing: international national local codes institutional T9 Preparing and selecting a vendor encompassing: client needs analysis project parameters according to business needs analysis project goals and criteria tender process management project monitoring and evaluation T10 Deployment principles for rollout of Biometrics system(s) encompassing: scalability and manageability trailing and testing commissioning compliance documentation |