Page 201 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 201
Unit 13: Privacy Technological Impacts
13.6 Review Questions Notes
1. What are RFID tags? Explain the working of RFID tags.
2. “Most RFIDs are vulnerable to cloning”. Explain.
3. Illustrate the privacy impact of RFID.
4. What are biometric devices? Illustrate the working of biometrics devices.
5. Elucidate the steps used in Biometric authentication systems.
6. Enlighten how the biometrics devices assist in preserving privacy.
7. What is a smart card? Illustrate the concept.
8. Illustrate the various applications of smart card.
9. Describe how smart card applications support in maintaining privacy.
10. Prior to any authentication attempts, a user is “enrolled” by creating a reference profile
(or template) based on the desired physical attribute. Comment.
Answers: Self Assessment
1. access keys 2. tags
3. attack 4. third
5. security 6. Biometric
7. identity 8. Physical
9. reference 10. Imperfections
11. smart card is 12. plastic
13. passive 14. special
15. complexity
13.7 Further Readings
Books An Introduction to Computer Security: The NIST Handbook
Managing Enterprise Information Integrity: Security, Control and Audit Issues,
By IT Governance Institute
Principles of Information Security by Michael E. Whitman and Herbert Mattord;
Risk Management Guide for Information Technology Systems
Risks of Customer Relationship Management: A Security, Control, and Audit Approach
by Pricewaterhousecoopers Llp
Security, Audit & Control Features PeopleSoft: A Technical and Risk Management Reference
Guide; 2nd Edition, by Deloitte Touche Tohmatsu Research Team; ISACA
Online link www.aimglobal.org
LOVELY PROFESSIONAL UNIVERSITY 195