MTA T215B Flashcards

1
Q

Define Anonymity

A

we might want some actions to be 🔴untraceable🔴 to us as specific.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Control of personal data

A

✅ We want the 🟢right🟢 to control our personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Electronic Codebook (ECB):

A

✅independent encryption approach
📌each block is encrypted independently 🆓 of any other,
🔑The same key will be used for each block.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

🔴 Drawbacks of ECB:

A
  • Two similar plaintext blocks ➡️ Similar ciphertext blocks. 📑📑
    Fixed ciphertext positions ➡️⚠️Vulnerability. 🔓
  • Not practical for long repetitive stings of 1s and 0s . 🔁 ❌
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

explain the term “Surveillance”

A

a purposeful , routine , systematic , and focused attention paid to personal detail, for the sake of control , entitlement , management , influence , or protection 🛡️.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Mention two benefits that can be drawn from surveillance.

A
  • 📊 Progress towards efficient administration ⚙️.
  • 💰 Development of Western capitalism 💵 and the modern nation-state 🏛️.
  • 🦾 Reduce labor intensity 💪, increase reliability ✅, and enhance work volume 📈.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

three features of surveillance

A

🔹 1️. Citizens Under Surveillance.
✅ Citizens in public spaces are monitored, reducing their “public privacy.”

🔹 2️. No Choice for Citizens.
✅ Citizens cannot agree or reject surveillance; they have no control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being purposeful?

A

Aim for road safety, crime reduction, and national security,
“e.g., speed cameras helping control traffic”🚦

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being Routine?

A

Happens daily during driving, public presence, internet usage.🚗🌍

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being Systematic ?

A

It targets specific groups like drivers, people in designated areas, internet users, making it structured and organized. 👥

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do mass surveillance systems: speed cameras, street surveillance systems fit the characteristic of being Focused ?

A

It collects data on identifiable individuals, but accuracy varies:
speed cameras capturing vehicle data rather than identifying the driver directly.🎯

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

forms of privacy can potentially clash with a number of values.
Mention three of these factors.

A

🛑 Security & Accountability 🛑

Accountability → for personal or official actions.
Security → Crime prevention & detection.
Legal Standards → Laws may limit choices.
⚡ Convenience & Services ⚡

Efficiency, convenience → Faster access to services.
Service Access → Requires specific criteria.
Health Monitoring → Tracking health risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define singularities and discuss how these singularities are classified

A

🔹 Singularities
📌 regions where ridge lines form high-curvature shapes.
✅ Three main types: loop - delta - whorl.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

From your study of fingerprint recognition,
mention three types of fingerprint minutiae

A

▪ Termination النهاية
▪ Lake البحيرة
▪ Island or point الجزيرة أو النقطة
▪ Spur and crossover. الشوكة والتقاطع

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

define the term “biometric” and explain its two main types.
In your explanation, provide one example for each one of these types.

A

Biometric
Measurement of human characteristics used for identification in authentication.

Divided into two types:
- Physiological → Fingerprint, iris pattern 👀 🖐️.
- Behavioral → Gait or Signature 🚶‍♂️.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Discuss Gait recognition

A

How a person walks (Behavioral Biometric) 🚶‍♂️.
✅ Advantages:
- Captured from a distance 📏
- Detected without subject’s awareness 🎥

❌ Disadvantages:
* Difficult to capture (needs video analysis) 🎞️
* Computationally expensive (not suitable for real-time) 🖥️

17
Q

Discuss Typing pattern recognition.

A

How a person types on a keyboard (Behavioral Biometric).
including the pressure applied to each key and the intervals between key taps.

✅ Advantages:
* It has the potential to replace signatures in computer-based activities. ✍️
* not require user cooperation, computer can automatically capture it at login. 🤖

❌ Disadvantage:
* Still under development🛠️

18
Q

Define ridge configurations and state the three different levels of ridge configurations

A

the way ridge lines, and the valleys are arranged in a fingerprint. 🖐️✨

− 🌍 Global Level
− 📍 Local Level
− 🔬 Micro levels

19
Q

From your study of “Biometrics”, you have seen that turning a raw fingerprint image into a set of minutiae usually requires three main stages of processing. Explain briefly these stages.

A
  1. Binarisation (تحويل للونين فقط) 🖤 🔄
    Converting the greyscale raw fingerprint image into a black and white “binary image”. Where the appropriateness of the threshold is crucial.
  2. Thinning (التنحيف) 📏
    Reduces the width of each ridge to one pixel.
  3. Minutiae Detection (اكتشاف التفاصيل الدقيقة) 🔍
    Runs a 3×3-pixel window over the thinned fingerprint image to detect black pixels.
20
Q

Biometrics is designated by a set of characteristics. Among these characteristics are the “Distinctiveness” and “Acceptability”. Describe these two characteristics.

A
  • Distinctiveness:
    Indicates how well the biometric separate one individual from another.
  • Acceptability:
    Indicates the degree of acceptance of the biometric by the user.
21
Q

In the context of Biometrics, discuss the difference between
identification and authentication

A

Authentication systems
Confirming whether an individual is who he or she claims to be.
It is therefore a one-to-one comparison process.

Identification systems
Identifying one individual from a population of individuals.
It is therefore a one-to-many comparison process.

22
Q

define Number factorization

A

All numbers can be decomposed into two or more numbers
that multiply together to make the number.

23
Q

define Prime factorization

A

Prime factorization when all the factors are prime numbers.

24
Q

define Prime number

A

Prime numbers have only two factors: 1 and itself.

25
Q

define Compound number

A

Compound numbers have always more than two factors: 1, itself, and other factors.

26
Q

Define the term “Encryption”

A

information is changed in some systematic way🔒
to hide its content from everyone except its intended recipient.

27
Q

Define the term “Cryptology”.

A

The branch of science concerned with the concealment of information 📚

28
Q

Discuss the difference between Cryptography and Cryptanalysis

A

🔹 Cryptography 🛠️: The science of creating codes and ciphers.

🔹 Cryptanalysis 🔓: The science of breaking them.

29
Q

the “linguistic analysis”. In this context, explain this approach and provide two examples to illustrate the idea.

A

Identifies linguistics pattern in plaintext for textual context

All languages have unique patterns.

✅ ‘Q’ is almost always followed by ‘U’ .
✅ Frequent letter pairs (Digraphs): ‘th’, ‘ea’, ‘of’, ‘st’
✅ Common repeated letters: ‘ee’, ‘oo’, ‘tt’.

30
Q

In Cryptography. “codes” and “ciphers: have different have meanings.
From your study, discuss the difference between them.

A

🔹 Codes: 📝⛓️ الأكواد
✔ Replace words or phrases with alternative symbols (code words).
✔ Not always for secrecy, sometimes used as abbreviations or alternative communication.
✔ Relies on codebooks for encoding and decoding.

🔹 Ciphers: 🔐 الشفرات
✔ Used for encryption by substituting or rearranging symbols.
✔ Follows systematic rules (structured encryption process).
✔ Always used for secrecy and security.

31
Q

explain the operation of “Stream ciphers” (encryption and decryption).

A

🔹 1. Encryption: 🔐
📌 💻 Stream ciphers encrypt small data segments (bit-by-bit).
✅ Key Features:
* Encrypt on-the-fly (during transmission).
* Uses a short key (“seed”) to generate a long, random key stream.
* 🔑 Combines the key stream with plain text using XOR to create ciphertext.

🔹2. Decryption: 🔓
📌 The decryption process mirrors encryption.
✅ Key Features:
* Uses the same key stream for decryption “on the fly”.
* 🔄 Must be synchronized between sender & receiver.
* Ensures each bit or byte is decrypted using the same key.

32
Q

Advantages over the block cipher: 🚀

A

✅ ⏳ Faster than block ciphers.
✅ Less complex and easier to implement in hardware.

33
Q

Common applications: 📡

A

✔ when input stream length is unpredictable (e.g., telecommunications).
✔ when input buffering is limited.