Page 201 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 201

Unit 13: Privacy Technological Impacts




          13.6 Review Questions                                                                 Notes

          1.   What are RFID tags? Explain the working of RFID tags.
          2.   “Most RFIDs are vulnerable to cloning”. Explain.

          3.   Illustrate the privacy impact of RFID.
          4.   What are biometric devices? Illustrate the working of biometrics devices.
          5.   Elucidate the steps used in Biometric authentication systems.
          6.   Enlighten how the biometrics devices assist in preserving privacy.
          7.   What is a smart card? Illustrate the concept.

          8.   Illustrate the various applications of smart card.
          9.   Describe how smart card applications support in maintaining privacy.
          10.  Prior to any authentication attempts, a user is “enrolled” by creating a reference profile
               (or template) based on the desired physical attribute. Comment.

          Answers: Self  Assessment

          1.   access keys                       2.  tags
          3.   attack                            4.  third
          5.   security                          6.  Biometric

          7.   identity                          8.  Physical
          9.   reference                         10.  Imperfections
          11.  smart card is                     12.  plastic
          13.  passive                           14.  special

          15.  complexity

          13.7 Further Readings




           Books      An Introduction to Computer Security: The NIST Handbook
                      Managing Enterprise  Information Integrity:  Security, Control  and Audit  Issues,
                      By IT Governance Institute

                      Principles of Information Security by Michael E. Whitman and Herbert Mattord;
                      Risk Management Guide for Information Technology Systems
                      Risks of Customer Relationship Management: A Security, Control, and Audit Approach
                      by Pricewaterhousecoopers Llp
                      Security, Audit & Control Features PeopleSoft: A Technical and Risk Management Reference
                      Guide; 2nd Edition, by Deloitte Touche Tohmatsu Research Team; ISACA




          Online link  www.aimglobal.org



                                           LOVELY PROFESSIONAL UNIVERSITY                                   195
   196   197   198   199   200   201   202   203   204   205   206