Page 196 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 196

Information  Security and Privacy




                    Notes          parties do not connect tag data with individuals yet supply them with consumer goods tagged
                                   with functional RFID tags that they or third parties could later read. It could be recommended
                                   that such parties take accountability for either deactivating the tag or offering information to
                                   individuals regarding the presence of the tags, the privacy risks associated to them and the
                                   means to avert or mitigate such risks. Lastly, and more usually, RFID is not well understood by
                                   individuals. Mounting the level of awareness and understanding about RFID, its possibilities
                                   and limits in addition to benefits and risks, can contribute to falling this perception concern. It
                                   may also assist individuals  make suitable  options and  support efforts  by organizations  to
                                   organize privacy pleasant systems.




                                     Notes  Efforts to increase RFID privacy enhancing technologies are continuing and could
                                     be encouraged. Methods like data minimization and anonymisation can be applied  to
                                     RFID.

                                   Self Assessment


                                   Fill in the blanks:
                                   1.  RFID chips are everywhere such as companies and labs and are used as ....................... .
                                   2.  The RFID ....................... work  by broadcasting a few bits of information to  specialized
                                       electronic readers.
                                   3.  The potential ....................... of privacy via the use of RFID is based on both the technology
                                       accessed and the context.

                                   4.  RFID might disclose to ....................... parties  information regarding objects carried by
                                       individuals without their information.
                                   5.  The option of the RFID technology to be used in a system influences the defense of privacy
                                       just as it impacts the ....................... of the system.

                                   13.2 Use with Biometrics

                                   Biometric devices authenticate users to access control systems through some sort of personal
                                   identifier such as a fingerprint, voiceprint, iris scan, retina scan, facial scan, or signature dynamics.
                                   The nice thing about using biometrics is that end-users do not lose or misplace their personal
                                   identifier. It’s hard to leave your fingers at home. However, biometrics have not caught on as
                                   fast as originally anticipated due to the false  positives and false negatives  that are common
                                   when using biometric technologies.
                                   Biometric authentication systems employ unique physical characteristics (or attributes) of an
                                   individual person in order to authenticate the person’s identity. Physical attributes employed in
                                   biometric authentication systems include fingerprints, hand geometry, hand -written signatures,
                                   retina patterns and voice patterns. Biometric authentication systems based upon these physical
                                   attributes have been developed for computer login applications.
                                   Biometric authentication systems generally operate in the following manner:
                                   1.  Prior to any authentication attempts, a user is “enrolled” by creating a reference profile
                                       (or template) based on the desired physical attribute. The reference  profile is  usually
                                       based on the combination of several measurements. The resulting template is associated
                                       with the identity of the user and stored for later use.




          190                               LOVELY PROFESSIONAL UNIVERSITY
   191   192   193   194   195   196   197   198   199   200   201