Page 196 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 196
Information Security and Privacy
Notes parties do not connect tag data with individuals yet supply them with consumer goods tagged
with functional RFID tags that they or third parties could later read. It could be recommended
that such parties take accountability for either deactivating the tag or offering information to
individuals regarding the presence of the tags, the privacy risks associated to them and the
means to avert or mitigate such risks. Lastly, and more usually, RFID is not well understood by
individuals. Mounting the level of awareness and understanding about RFID, its possibilities
and limits in addition to benefits and risks, can contribute to falling this perception concern. It
may also assist individuals make suitable options and support efforts by organizations to
organize privacy pleasant systems.
Notes Efforts to increase RFID privacy enhancing technologies are continuing and could
be encouraged. Methods like data minimization and anonymisation can be applied to
RFID.
Self Assessment
Fill in the blanks:
1. RFID chips are everywhere such as companies and labs and are used as ....................... .
2. The RFID ....................... work by broadcasting a few bits of information to specialized
electronic readers.
3. The potential ....................... of privacy via the use of RFID is based on both the technology
accessed and the context.
4. RFID might disclose to ....................... parties information regarding objects carried by
individuals without their information.
5. The option of the RFID technology to be used in a system influences the defense of privacy
just as it impacts the ....................... of the system.
13.2 Use with Biometrics
Biometric devices authenticate users to access control systems through some sort of personal
identifier such as a fingerprint, voiceprint, iris scan, retina scan, facial scan, or signature dynamics.
The nice thing about using biometrics is that end-users do not lose or misplace their personal
identifier. It’s hard to leave your fingers at home. However, biometrics have not caught on as
fast as originally anticipated due to the false positives and false negatives that are common
when using biometric technologies.
Biometric authentication systems employ unique physical characteristics (or attributes) of an
individual person in order to authenticate the person’s identity. Physical attributes employed in
biometric authentication systems include fingerprints, hand geometry, hand -written signatures,
retina patterns and voice patterns. Biometric authentication systems based upon these physical
attributes have been developed for computer login applications.
Biometric authentication systems generally operate in the following manner:
1. Prior to any authentication attempts, a user is “enrolled” by creating a reference profile
(or template) based on the desired physical attribute. The reference profile is usually
based on the combination of several measurements. The resulting template is associated
with the identity of the user and stored for later use.
190 LOVELY PROFESSIONAL UNIVERSITY