You have been asked to participate in developing the requirements for an RFID-based identification card for students, faculty, and affiliates at a university. First, list 5 to 10 different uses of the card. Second, from that list of uses, detail what data the card needs to broadcast to receivers that will accomplish those uses. Third, identify uses that could be made of that data by rogue

receivers surreptitiously planted around the university campus. Which rogue accesses threaten personal privacy? In what ways? What is the degree of harm?

What will be an ideal response?


Some
possible
uses
of
the
card
are
building
access;
paying
for
purchases;
tracking
class
attendance;
logging
into
computers;
proving
identity
to
other
people.
Some
possible
data
the
card
would
need
to
broadcast
include
student
identity
information,
such
as
name,
ID
number,
or
social
security
number;
money
transfer
information,
potentially
including
an
account
number
or
available
balance;
computer
account
information.
Some
possible
rogue
uses
are
identity
theft;
access
to
a
purchasing
account;
card
cloning;
computer
account
hijacking.
All
of
these
threaten
privacy
in
myriad
possible
ways.

Computer Science & Information Technology

You might also like to view...

Arrays may have dimensions.

a) one b) two c) any number of d) a or b

Computer Science & Information Technology

Select one of the use cases and create a class diagram.

What will be an ideal response?

Computer Science & Information Technology

Within a paragraph, you do not need to press ________ to create new lines

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Page Setup dialog box contains additional options not found on the Excel Ribbon

Indicate whether the statement is true or false

Computer Science & Information Technology