Information Technology Reference
In-Depth Information
table 3.2
First three iA 2 Views by iA Core principles: examples
IA 2  View 
/IA Core Principle
People
Policy
Process
Confidentiality
NA
To protect storage of
RFID card details that
contain biometric
information
NA
Integrity
NA
Ensure the integrity of
biometric information
to guard against
substitutions and fraud
NA
Availability
NA
Ensure availability of
biometric information
to ensure expedient
processing of entry/exit
NA
Possession
Retaining possession of
RFID card
Card issuance, use, and
revocation policy; lost
card policy
Authenticity
Fingerprint of individual
actually belongs to that
individual; identity
credential validation
prior to RFID card
issuance
NA
NA
Utility
NA
NA
NA
Nonrepudiation
NA
Transaction log policy to
ensure any
modifications to entry/
exit details may not
later be denied
Authorized use
NA
NA
NA
Privacy
NA
To protect transmission
of RFID card details that
contain biometric
information
NA
 
Search WWH ::




Custom Search