You have been asked to participate in developing the requirements for an RFID-based identification card for students, faculty, and affiliates at a university
1. list 5 to 10 different uses of the card.
2. from that list of uses, detail what data the card needs to broadcast to receivers that will accomplish those uses.
3. identify uses that could be made of that data by rogue receivers surreptitiously planted around the university campus.
Which rogue accesses threaten personal privacy? In what ways? What is the degree of harm?
1 . Some possible uses of the cardare building access; paying for purchases; tracking class attendance; logging into computers; proving identity to other people.
2. Some possible data the card would need to broadcast include student identity information, such as name, ID number, or social security number; money transfer information, potentially including an account number or available balance; computer account information.
3. Some possible rogue uses are identity theft; access to a purchasing account; card cloning; computer account hijacking. All of these threaten privacy in myriad possible ways.
You might also like to view...
When you transfer music from a CD to a compressed format on your computer, you ________ the CD
A) tag B) rip C) copy D) burn
Worksheets name "tabs" automatically reflect the contents of the worksheets
Indicate whether the statement is true or false