MTA T215B Flashcards
(33 cards)
Define Anonymity
we might want some actions to be 🔴untraceable🔴 to us as specific.
Define Control of personal data
✅ We want the 🟢right🟢 to control our personal data.
Electronic Codebook (ECB):
✅independent encryption approach
📌each block is encrypted independently 🆓 of any other,
🔑The same key will be used for each block.
🔴 Drawbacks of ECB:
- Two similar plaintext blocks ➡️ Similar ciphertext blocks. 📑📑
Fixed ciphertext positions ➡️⚠️Vulnerability. 🔓 - Not practical for long repetitive stings of 1s and 0s . 🔁 ❌
explain the term “Surveillance”
a purposeful , routine , systematic , and focused attention paid to personal detail, for the sake of control , entitlement , management , influence , or protection 🛡️.
Mention two benefits that can be drawn from surveillance.
- 📊 Progress towards efficient administration ⚙️.
- 💰 Development of Western capitalism 💵 and the modern nation-state 🏛️.
- 🦾 Reduce labor intensity 💪, increase reliability ✅, and enhance work volume 📈.
three features of surveillance
🔹 1️. Citizens Under Surveillance.
✅ Citizens in public spaces are monitored, reducing their “public privacy.”
🔹 2️. No Choice for Citizens.
✅ Citizens cannot agree or reject surveillance; they have no control
How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being purposeful?
Aim for road safety, crime reduction, and national security,
“e.g., speed cameras helping control traffic”🚦
How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being Routine?
Happens daily during driving, public presence, internet usage.🚗🌍
How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being Systematic ?
It targets specific groups like drivers, people in designated areas, internet users, making it structured and organized. 👥
How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being Focused ?
It collects data on identifiable individuals, but accuracy varies:
speed cameras capturing vehicle data rather than identifying the driver directly.🎯
forms of privacy can potentially clash with a number of values.
Mention three of these factors.
🛑 Security & Accountability 🛑
Accountability → for personal or official actions.
Security → Crime prevention & detection.
Legal Standards → Laws may limit choices.
⚡ Convenience & Services ⚡
Efficiency, convenience → Faster access to services.
Service Access → Requires specific criteria.
Health Monitoring → Tracking health risks.
Define singularities and discuss how these singularities are classified
🔹 Singularities
📌 regions where ridge lines form high-curvature shapes.
✅ Three main types: loop - delta - whorl.
From your study of fingerprint recognition,
mention three types of fingerprint minutiae
▪ Termination النهاية
▪ Lake البحيرة
▪ Island or point الجزيرة أو النقطة
▪ Spur and crossover. الشوكة والتقاطع
define the term “biometric” and explain its two main types.
In your explanation, provide one example for each one of these types.
Biometric
Measurement of human characteristics used for identification in authentication.
Divided into two types:
- Physiological → Fingerprint, iris pattern 👀 🖐️.
- Behavioral → Gait or Signature 🚶♂️.
Discuss Gait recognition
How a person walks (Behavioral Biometric) 🚶♂️.
✅ Advantages:
- Captured from a distance 📏
- Detected without subject’s awareness 🎥
❌ Disadvantages:
* Difficult to capture (needs video analysis) 🎞️
* Computationally expensive (not suitable for real-time) 🖥️
Discuss Typing pattern recognition.
How a person types on a keyboard (Behavioral Biometric).
including the pressure applied to each key and the intervals between key taps.
✅ Advantages:
* It has the potential to replace signatures in computer-based activities. ✍️
* not require user cooperation, computer can automatically capture it at login. 🤖
❌ Disadvantage:
* Still under development🛠️
Define ridge configurations and state the three different levels of ridge configurations
the way ridge lines, and the valleys are arranged in a fingerprint. 🖐️✨
− 🌍 Global Level
− 📍 Local Level
− 🔬 Micro levels
From your study of “Biometrics”, you have seen that turning a raw fingerprint image into a set of minutiae usually requires three main stages of processing. Explain briefly these stages.
- Binarisation (تحويل للونين فقط) 🖤 🔄
Converting the greyscale raw fingerprint image into a black and white “binary image”. Where the appropriateness of the threshold is crucial. - Thinning (التنحيف) 📏
Reduces the width of each ridge to one pixel. - Minutiae Detection (اكتشاف التفاصيل الدقيقة) 🔍
Runs a 3×3-pixel window over the thinned fingerprint image to detect black pixels.
Biometrics is designated by a set of characteristics. Among these characteristics are the “Distinctiveness” and “Acceptability”. Describe these two characteristics.
- Distinctiveness:
Indicates how well the biometric separate one individual from another. - Acceptability:
Indicates the degree of acceptance of the biometric by the user.
In the context of Biometrics, discuss the difference between
identification and authentication
Authentication systems
Confirming whether an individual is who he or she claims to be.
It is therefore a one-to-one comparison process.
Identification systems
Identifying one individual from a population of individuals.
It is therefore a one-to-many comparison process.
define Number factorization
All numbers can be decomposed into two or more numbers
that multiply together to make the number.
define Prime factorization
Prime factorization when all the factors are prime numbers.
define Prime number
Prime numbers have only two factors: 1 and itself.