ch 7 exrcieses

Upload: yazanalomari

Post on 24-Feb-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/25/2019 Ch 7 Exrcieses

    1/1

    Sample Exercises

    Chapter 7: Security

    1. What are the four major types of security threats in a biometric system?

    2. List the adversary attacks that can be mounted against a biometric sys-tem.

    3. In what ways can insiders (administrators and legitimate users) compro-mise the security of a biometric system?

    4. Briefly explain five key techniques that can detect spoof fingers. Discusstheir advantages and limitations.

    5. Explain how a hill-climbing attack can be mounted against a biometricsystem. What kind of countermeasures can be adopted to prevent suchan attack?

    6. Why is leakage of biometric template information a serious security andprivacy threat? What are the three main requirements in biometric tem-plate security?

    7. What are some of the common techniques that are used for securing pass-words? Explain why such techniques cannot be directly applied for secur-ing biometric templates.

    8. Discuss the advantages and limitations of storing biometric templates en-crypted using standard cryptographic constructs such as RSA or AES.

    9. State the properties that a non-invertible transformation function mustsatisfy to be useful for biometric template protection.

    10. What is a biometric cryptosystem? What factors determine the trade-offbetween the security and recognition performance of a biometric cryp-tosystem?

    1