ch 7 exrcieses
TRANSCRIPT
-
7/25/2019 Ch 7 Exrcieses
1/1
Sample Exercises
Chapter 7: Security
1. What are the four major types of security threats in a biometric system?
2. List the adversary attacks that can be mounted against a biometric sys-tem.
3. In what ways can insiders (administrators and legitimate users) compro-mise the security of a biometric system?
4. Briefly explain five key techniques that can detect spoof fingers. Discusstheir advantages and limitations.
5. Explain how a hill-climbing attack can be mounted against a biometricsystem. What kind of countermeasures can be adopted to prevent suchan attack?
6. Why is leakage of biometric template information a serious security andprivacy threat? What are the three main requirements in biometric tem-plate security?
7. What are some of the common techniques that are used for securing pass-words? Explain why such techniques cannot be directly applied for secur-ing biometric templates.
8. Discuss the advantages and limitations of storing biometric templates en-crypted using standard cryptographic constructs such as RSA or AES.
9. State the properties that a non-invertible transformation function mustsatisfy to be useful for biometric template protection.
10. What is a biometric cryptosystem? What factors determine the trade-offbetween the security and recognition performance of a biometric cryp-tosystem?
1