You have been asked to participate in developing the requirements for an RFID-based identification card for students, faculty, and affiliates at a university

1. list 5 to 10 different uses of the card.
2. from that list of uses, detail what data the card needs to broadcast to receivers that will accomplish those uses.
3. identify uses that could be made of that data by rogue receivers surreptitiously planted around the university campus.
Which rogue accesses threaten personal privacy? In what ways? What is the degree of harm?


1 . Some possible uses of the cardare building access; paying for purchases; tracking class attendance; logging into computers; proving identity to other people.
2. Some possible data the card would need to broadcast include student identity information, such as name, ID number, or social security number; money transfer information, potentially including an account number or available balance; computer account information.
3. Some possible rogue uses are identity theft; access to a purchasing account; card cloning; computer account hijacking. All of these threaten privacy in myriad possible ways.

Computer Science & Information Technology

You might also like to view...

The Python module_______ is used to encrypt and decrypt messages.

a) encrypt. b) cipher. c) rotor. d) None of the above.

Computer Science & Information Technology

You should use spritesheets only for decorative images because __________.

A. the dimensions of the spritesheet would be too large if it included all images. B. the filesize of the spritesheet would be too large if it included all images. C. you can't specify alt text for a spritesheet. D. only decorative images can be optimized.

Computer Science & Information Technology

Panel ____ organize related panels.

a. collections b. groups c. bars d. layers

Computer Science & Information Technology

What is the meaning of the following mnemonics (and what do they do)?

a. LDRSH b RSBLES c CMPS d MRS r0,CPSR

Computer Science & Information Technology