Thursday, November 28, 2019
Part 1 Chapter 1-8 1. Chapter 1 Introduces Readers To The Town Of Mayc
Part 1 Chapter 1-8 1. Chapter 1 introduces readers to the town of Maycomb, its apperannce, its inhabitants, and the particular attitudes of many of its people. Find a sentence or a paragraph which illustrates each of the following attitudes/ideas. Quote at least a portion of the sentence or paragraph and give page number. a. pride in ancestry and "tradition" "tired old town" - p.9 b. pride in conformity and distrust of those who are different "Maycomb County had recently been told that it had nothing to fear but fear itself" - p.10 c. awareness difference in social classes "nothing to buy and no money to buy with it" - p.10 d. narrow span of interest and almost no interest in the world outside Maycomb. "nothing to see outside the boundaries of Maycomb County" - p.10 2. Approximately when does the story negin? Show evidence to support your answer. The setting of the story take place in Maycomb County, Alabama, during the 1930's. The neighborhood overall is very poor, with farming being the major way of making a living. (Cotton-farming) 3. What do we know for certain about Boo Radley? The Radley place and its mysterious inhabitant are described ub great detail. Scout was telling the story about Boo Radley, she said Radley was locked up as a teenager for once getting in trouble with police. Radley has been in the house ever since, although some people are convinced he come out at night. 4. Why is Boo fasinating to the children? At the summer, when Dill come out and play with Scout and Jem, Dill has always found interesting studying Boo's place, because Dill think Boo is phantom bogeyman. Chapter 2 1. Scout makes three mistakes during her first day at school. What are her mistakes, and why do they make Miss Caroline so angry? First of all, the teacher found out that Scout already can read, so she make Scout promise not to read to with her father; second, the teacher found out Scout was writing a letter to Dill, the teacher stop her from writing it and told Scout that in Grade 1, you only learn printing, and in Grade 3 you learn writing; third, Scout was tring to explain the ways of the Cunninghams, a family of poot but proud farmers who refuse charity. Miss Caroline thinks Scout is being insolent and after slapping her hand. 2. Why are the professional people in Maycomb poor at this time? The professtional people is poor at that time I think is because their learning system is so limited, student have no chance to things other than what the teacher have teached. 3. What is the WPA, and why won't Mr. Cunningham work for it? WPA stand for Works Progress Administration. He didn't work for it because he is proud of himself, he won't take help and charity, he take only what he work for. Chapter 3 1. Calpurnia lectures Scout on manners when Scout criticzes Walter's manners and Atticus supports her. What does this tell you about how both Calpurnia and Atticus feel about others? Scout has a good relationship with Atticus but she doesn't real ly like Calpurnia since she think Cal hates her because they always argue about things and always takes the side of Jem. And the point of view from Cal and Atticus is very difference. Cal will give lecture to the children if they did something wrong, but Atticus will try to impact the important message to the children. 2. Burris Ewell, Walter Cunningham, and Chuck little are all from extremely poor families. However, there are great differences both in appearance and in attitudes, particularly between the Cunninghams and the Ewells. What are those differences and why do you suppose they exist? Between Burris Ewell, Walter Cunningham - They are both from a very poor family. But Walter's family is respectable, but Ewell's family is disreputable. Ewell have no attemp of dressing up to school, following rule, or even come back to school again. But as for Walter, he attend school in a clean shirt and neatlt mended overall. This is to show how disreputable Ewell's family is, and pr epare us to the up coming
Sunday, November 24, 2019
The 8 Best Scholarship Websites and Search Tools
The 8 Best Scholarship Websites and Search Tools SAT / ACT Prep Online Guides and Tips Searching for relevant scholarships is perhaps the most frustrating part of the scholarship application process. There are so many awards out there, but itââ¬â¢s hard to know which ones are worth applying to without carefully sifting through an overwhelming amount of information. To make your search just a little bit easier, weââ¬â¢ve compiled some of thebest scholarship websites(and offlinesearch tools!) you can use to find scholarships. Of course, some are better than others - Iââ¬â¢ll also go into the strengths and weaknesses of each scholarship search method. At the end of the post, youââ¬â¢ll find tips for getting the most out of these scholarship search tools. Theyââ¬â¢re only helpful if you know how to use them effectively and efficiently - these strategies will help you navigate the (sometimes confusing) world of scholarship search tools. 7 Helpful Online Scholarship Search Tools Online tools are awesome because you canaccess huge databases of awardsfrom the comfort of your laptop. Thereââ¬â¢s no question that thereââ¬â¢s almost an overwhelming number of scholarshipslisted on each of these online tools - the question is whether or not you can find scholarships that actually apply to you. Some of these search tools are verypolished, whereas others look kind of scrappy. Some keep your information private, whereas others subject you to a LOT of college spam. Ultimately, though, they all provide access to info about thousands of scholarships. Your own priorities will dictate which search tools youââ¬â¢ll prefer. To help you figure that out, Iââ¬â¢ve listed the strengths and weaknesses of eachof these tools after trying them out myself. I think it's difficult to come up with a strong scholarship application strategy without a general idea ofboth what awards are available and what these awards look for in student applicants. I'd encourage you to spend a few hours just exploring these databases - just to check on what's out there - before doing a more focused search (perhaps with the assistance of a guidance or college counselor). Hereââ¬â¢s the good stuff - the most popularscholarship search tools: College Board's Scholarship Search This site is perhaps the most well-known scholarship search tool available. It searches for awards based on so many criteria that you may find scholarships in some unexpected places. You can enter in as much or as little identifying or demographic information as youââ¬â¢d like. The scholarship search tool then lists any scholarship award you may qualify for based on the info youââ¬â¢ve entered. If you already have a specific award in mind, you can use the search function to search for it in the College Board scholarship database. Obviously, the more information you enter, the more relevant and helpful the search results will be. Some of the information you can enter includes minority status, disability status, religious affiliation, and veteran status. Pros You donââ¬â¢t have to sign up for anything, or provide any personal identifying information, in order to use the scholarship search. The scholarship search results include basic information on eligibility requirements, award numbers/amounts, and application deadlines. You can also select whether youââ¬â¢d like to search for awards based on financial need, academic achievement, or both, which is an awesome function. Cons Lists sweepstake scholarships where you have to sign up for different sites (and subject yourself to spam) in order to apply. Itââ¬â¢s the responsibility of the scholarship organization to update policies, awards, or requirements - many things may not be up to date, although the site itself updates regularly. You canââ¬â¢t enter in academic information (like GPA or ACT/SAT scores) to filter out awards where you may not meet these criteria. Youââ¬â¢ll have to sift through individualawards, all with varying eligibility requirements, to see which ones may be a good fit. The College Board is best known as the creator of the SAT, but its scholarship search is one of the best options out there. Scholarships.com Scholarships.com claims to be the largest free scholarship search resource available, with over 2.7 million scholarships listed in their database. You have to make an account, but Scholarships.com promises to keep your information private. The site lets you save, ââ¬Å"favorite,â⬠or remove scholarship matches associated with your account. Pros The site claims to update daily, although just like with College Board, responsibility lies with the actual scholarship organization to provide new info. Itââ¬â¢s easy to see how many awards are given (and how much the awards are worth) witheach scholarship listing. The save/favorite/remove functions make it easy to pare down awards youââ¬â¢re interested in. Their privacy policy easily allows you to opt-out of having your personal information shared. Cons There are scholarship ââ¬Å"adsâ⬠at the top of your match results from sweepstake-esque scholarship programs. These awards arenââ¬â¢t exactly illegitimate, but theyââ¬â¢re created to get you to sign up for various sites or services. You canââ¬â¢t search by keyword or by scholarship type. Fastweb You can enter academic info (GPA, intended major) and other helpful identifying info (ethnicity, citizenship status, military status) to get scholarship matches when you make a profile with Fastweb. You can also enter in other relevant activities - like sports, student activities, SAT/ACT score, educational background, and career goals - to possibly get a more tailored list of awards with Fastweb.Again, the more specific you can be with personal information, the more relevant the scholarship matches will be. Pros The scholarship search results include basic information on eligibility requirements, award numbers/amounts, and application deadlines. Scholarship matches are listed in order of application deadline, so you donââ¬â¢t have to worry about checking out awards where the deadlineââ¬â¢s already passed. Scholarships are rigorously vetted (according to Fastweb), so you wonââ¬â¢t have to worry about submitting personal information to a sketchy organization and falling prey to a scholarship scam. Cons You have to sign up with your email address, birthday, phone number, and address, which opens you up to spam. Just like with the College Board, you may have to sift through awards that you find undesirable. Some of them are sweepstakes awards, whereas others are scholarship programs with clear ulterior motives and/or political agendas. Itââ¬â¢s the responsibility of the scholarship organization to update policies, awards, or requirements - many things may not be up to date. ScholarshipMonkey.com This scholarship tool claims to offer over 1 million scholarships, from over 4,000 sources, worth more than $3 billion. Itââ¬â¢s unclear how often they update their database, however, so itââ¬â¢s impossible to know whether the listings are valid without checking them out yourself. You can search for scholarships in three ways: Setting up a profile and seeing scholarship matches Searching by keyword (e.g. an academic or extracurricular interest) Checking out lists of scholarships (e.g. scholarships for women, nursing scholarships, scholarships by major) Pros You donââ¬â¢t need to sign up for anything or make an account to use the keyword search or the ââ¬Å"listâ⬠search function. In theory, the profile-matched scholarships shouldpresent better scholarship options than just randomly searching for awards. Cons The keyword search function isnââ¬â¢t particularly helpful. It doesnââ¬â¢t sort by relevance, so it's easy to miss important awards. The scholarship preview descriptions donââ¬â¢t tell you how much money is at stake. In order to find out what you could win, you have to click through to read more. A lot of the links to scholarships are outdated. I got a lot of ââ¬Å"internal server errorsâ⬠or ââ¬Å"application errorsâ⬠when trying to read more about various awards. To work around this problem, you could always Google the award name to learn more. If you make a profile to get scholarship matches, your information wonââ¬â¢t remain private unless you opt out from their standard policies upon sign-up. Cappex With Cappex, you receive scholarship matches by completing an online profile. They donââ¬â¢t ask you about as many personal characteristics as the College Board, but you can enter basic academic info (like your weighted and unweighted GPA). Itââ¬â¢s unclear whether this info helps match you to scholarships or whether itââ¬â¢s just provided to colleges who may be interested in you. Youââ¬â¢re asked a lot of questions about your college preferences, presumably to match you with scholarships available at different schools. In reality, I imagine a lot of this information is actually provided to the colleges themselves (along with your GPA). Cappex has a special ââ¬Å"Be Recruitedâ⬠program which may help varsity athletes connect with schools to earn scholarships for sports. Pros Cappex seems to be fairly selective with the scholarships listed. It's easy to sort the scholarships into ââ¬Å"will apply/might apply/will not applyâ⬠categories for future reference. It's easy to tell how much anaward is worth, what you have to do to apply, etc., without having to jump through too many hoops. Cons This site seems to serve more as a college search tool than a scholarship search tool. Youââ¬â¢re forced to provide information about your home address, which is presumably given out to third parties (you might get a lot of brochures in the mail from interested schools). ââ¬Å"Featuredâ⬠scholarships (i.e. ads) are listed at the top of your matches. Your Regular Old Search Engine Using a search engine like Google gives you a lot more freedom and flexibility when youââ¬â¢re searching for scholarships. Google is also much better at presenting relevant, legitimate results if you have specific keywords in mind. You might find individual awards or lists of relevant scholarships that others have already put together. An obvious (put important) search tool for scholarship awards Pros Youââ¬â¢ll be directed right to scholarship organizationsââ¬â¢ pages. Youââ¬â¢ll likely come across compilations of scholarship programs like the ones we do here at PrepScholar. Itââ¬â¢s easier to search for scholarships based on niche interests, skills, or passions. Itââ¬â¢s also an important tool if you plan on looking into local scholarships (which you should definitely do - they tend to be less competitive than national awards). Cons Thereââ¬â¢s a lot more irrelevant information to sift through if youââ¬â¢re not specific enough with your keywords. You should be wary of ads, sweepstakes, or any scholarship program where you have to enter sensitive information (e.g. your social security number) or credit card payment. Youââ¬â¢ll have to keep careful notes on which scholarships youââ¬â¢re interested in. PrepScholar Our blog has tons of free content on available scholarships, whether you're looking for information onpopular individual awards or broader guides to scholarship applications in general. Here are some of our most popular posts to get you started: Top scholarships for freshmen and sophomores Top scholarships for high school juniors Top scholarships for high school seniors Top minority scholarships Top engineering scholarships How to win a full ride scholarship Colleges with full ride scholarships How to win a local scholarship How to win a Gates Millennium scholarship How to win a Coca-Cola scholarship How to win a Florida Bright Futures scholarship How to win a McDonald's scholarship Bonus Offline Scholarship Search Tool: Your Guidance and/or College Counselor Shockingly, there are places you can go besides the internet to get information about scholarship programs.If youââ¬â¢re serious about your scholarship research, you should definitely schedule a meeting with your guidance or college counselor. They likely have insider info on scholarship programs that may be a good fit for you, especially when it comes to local awards. If you have unique skills or needs (e.g. youââ¬â¢re hoping to be recruited for a college sport), your counselor may also be able to help guide you through the process - this mentorship definitely isnââ¬â¢t something you can get from an online scholarship search tool. The VeryBest Scholarships Websites As you can see, you have a lot of options when it comes to the tools available to search for scholarships. The question of which one youshould usewill, like most things, come down to personal preference. Iââ¬â¢d encourage you to at least briefly check out all of the above search toolsto see which ones might appeal to you. If you only have the time or the patience to check out one or two scholarship tools, though, I would recommend The College Board and Scholarships.com. I like College Board for a few reasons - first, it looks the nicest. I know this isnââ¬â¢t super important, but I really appreciate an easy-to-use and aesthetically appealing site. Perhaps more importantly, I also like that theyââ¬â¢re the most thorough in their scholarship match questionnaire, ensuring that no rock will go unturned when it comes to finding appropriate awards. Finally,itââ¬â¢s a big plus in my book that you donââ¬â¢t have to make an account and provide identifying information in order to use the service. Iââ¬â¢d recommend Scholarships.com because itââ¬â¢s perhaps the largest scholarship search engine out there. It tends to do better than other engines (especially Fastweb) when it comes to matching students with appropriate awards. I also appreciate that you can opt out of having personal info shared with third parties. None of these search options may be perfect, but some are better than others. Tips for Using Online Scholarship Search Tools You may have noticed that a lot of the cons listed above areshared among many scholarship search tools. If you want to avoid the most common drawbacks that come with using popular search tools, follow these tips and strategies. If You Don't Want to Be Spammed With Emails or Snail Mail: Avoid search tools that require you to provide an email address or physical address unless itââ¬â¢s clear that they donââ¬â¢t provide that information to third parties. Make an email address thatââ¬â¢s dedicated only to these scholarship search engine profiles.Instead of getting overwhelmed with spam in your personal account, you'll just get emails in this throwaway account. Opt out of having these search engines pass on your info to third parties whenever possible. If You Want to Find Best-Fit Scholarships: Use more than one scholarship search strategy. Some databases may be better equipped to list relevant scholarships for you based on your interests and background. Donââ¬â¢t just look at just big, impressive awards - they may be particularly tempting, but itââ¬â¢s a waste of time and energy to apply to them unless youââ¬â¢re an exceptionally good fit (competition for those scholarships is usually crazy). Look for local scholarships. You may have more luck finding awards that are geared towards students in your area. If You're Feeling Overwhelmed by the Number of Available Awards: Donââ¬â¢t let your scholarship search creep into time you spend on schoolwork and important extracurriculars. Your grades, in particular, should be your #1 priority - higher grades will help you win merit scholarships (that you donââ¬â¢t even have to apply for!) to certain schools. Plan on applying to 8-10 scholarship programs, and be strategic about it. Approach it like you would your college apps - a few ââ¬Å"reach,â⬠a few ââ¬Å"safety,â⬠and a few ââ¬Å"targetâ⬠awards. Keep your own notes (try an excel or Googlespreadsheet) with informationon the scholarships youââ¬â¢re interested in and the criteria you care about - e.g. deadlines, application components, award amounts, and eligibility criteria. Itââ¬â¢s important to have all this info consolidated, especially if youââ¬â¢re using multiple search tools. What's Next? Now that you know how tofind scholarships, your next step should be figuring out how towin scholarships. We have a lot of information to get you started. Start broad with our guides on how to win a full ride scholarship or how to win a community service scholarship. Looking at some bigger, competitive national awards? Read about how to win the Gates scholarship, the Coca-Cola scholarship, the Walmart scholarship, and the McDonald's scholarship. Want to improve your SAT score by 160 points or your ACT score by 4 points?We've written a guide for each test about the top 5 strategies you must be using to have a shot at improving your score. Download it for free now:
Thursday, November 21, 2019
Film Analysis Movie Review Example | Topics and Well Written Essays - 2000 words
Film Analysis - Movie Review Example She happened upon a truck stop Baghdad Cafe which is already dilapidated, yet struggling. Meanwhile, the owners of the cafe Brenda played by C.C.H. Pounder was also having an argument with his husband, and the husband left Brenda, too. Brenda is a tough wife-mother and short tempered. She was skeptic when Jasmin rented a room at an adjacent motel and remained suspicious of the foreignerââ¬â¢s motives. But later on, Jasmin and Brenda became friend and Jasmin was even allowed to work at the cafe. Percy Adlon claimed that the movie ââ¬Å"exemplifies how one person in the right place can affect a community of lives,â⬠may be a fictional exaggeration but achievable in reality through concerted efforts of major and minor characters. But the movie was able to build up in its simplicity through the gradual introduction of various characters. There were Brendaââ¬â¢s children including her son played by Darron Flag who played the piano, the glamorous tattoo artist Debby played by C hristine Kauffman, a former Hollywood set painter Rudi Coxx played by Jack Palance. The last two are just two of the regulars of the almost deserted cafe. So much like in real life, it took effort and initiative to foster change at any environment. And Jasminââ¬â¢s German fastidiousness soon crept up she started cleaning her motel room and the cafe. She also developed fascination with savvy-talking Rudi who proposed to paint a series of portraits of Jasmin, with every painting bolder than the last. To keep herself engaged and busy, Jasmin also started learning the magic kit found in her suitcase and showing her skills to the thinning cafe customers. However, it was this small magic show that soon spread by word of mouth among the trucking community. The cafe soon peaked and packed. Through the presence and efforts of one person- Jasmin ââ¬â Baghdad Cafe became a place to go. It became an interesting place because Jasmin started to care for the place and the people in it. The desert setting, a ââ¬Å"middle of nowhereâ⬠feeling that is also a metaphor of what Jasmin and Brenda are going through: like a mid-life crisis that is so vast, bland, and nowhere to escape. The boomerang represents a reciprocal experience of what one gives and being returned, such as what Jasmin gave to the others, and then, returned back to her. The magic tricks, too, meant to represent the efforts that individuals provide for others may actually serve as trigger for surprising things to come. Such can be said to Rudi Coxx who has retired as a painter, and yet, he strangely began to have interest on the work again. In the beginning, a common denominator about the characters in Baghdad Cafe is their being stuck on a rut. Life has become so mundane and boring they seem to have succumbed to an end, a plateau. This can be said of Jasmin, Brenda, Rudi, and the rest of the characters of Baghdad Cafe. Yet, when Jasmin started to make the most of what she have, with cleaning materia ls at hand, perspectives have changed. From Brendaââ¬â¢s suspicion arose the glaring message that Jasmin might be sending. However, Jasmin did things out of sincerity and a need to address her own rut. Through her efforts, Rudi also started to have interest about painting, again. Brenda and her children became more inspired to improve the cafe. The presence of Jasmin, one person in the right place, has helped change the perspective of
Wednesday, November 20, 2019
Racism Essay Example | Topics and Well Written Essays - 750 words
Racism - Essay Example Two of these stereotypes are the idea that Chinatown and Chinese people are somehow immoral and dirty. A lot of the background of these and other racial ideas has to do with a shift in the thinking of the nineteenth century "from ethnocentrism to a radical biological determinism," where people tried to come up with scientific proof that one race was somehow better than another (Anderson 585). These resulted in stereotyping of other races and also, such as in the case of Chinatown, the splitting apart from mainstream society of other races so that their lesser qualities would not "contaminate" white society (Anderson 585). Anderson quotes a secretary of state from 1885 in Canada who says that Chinatown is "attended with evils" and that "because of their habits of lodging crowded quarters and accumulating filth, is offensive if not likely to breed disease" (Anderson 586). This idea continues to grow in the period from then until the 1920s. Darwin's ideas and other scientific advances w ere used to argue that Chinese were inferior, dirtier, and that the areas they lived were bad because of this. It was the council of Vancouver who officially labeled the area "Chinatown" in the 1890s and then actually destroyed some of the buildings because of supposed health complaints. The other idea which grew at the same time period was the idea of Chinese immorality. Anderson says the area was seen as "non-Christian, uncivilized, and amoral" and that because of this perception, Chinatown was supposed to be a lawless opium-addicted area with "wickedness unmentionable" (589). At the same time he disagrees that this perception came about purely because Chinese people were not white. He says that instead, the government was motivated by "economic competition" and racial myths which were thoroughly embedded in the government's employees (Anderson 590). 2) In the Aitken reading on school shootings, how is the media depicting these tragic events? And, what is the importance of place i n the varying reactions to the murders? Aitken talks about several school shootings which took place near San Diego in 2001, and compares these to the Columbine shooting that was so shocking when it happened. Several other authors have claimed that the Columbine shooting was inspired by Neo-nazi movements, and that it is disturbing that the media did not report on this information (Aitken 594). Although Aitekn does not think the San Diego shootings were inspired in the same way, he says there is still an element of racism in how the media represented them in news. Specifically this has to do with where the murders took place. Aitken argues that both the place of the school shootings and the way the media reported on them after they happened point towards what he calls "a normalizing and mythic geography of fear" (595). What he means by this seems to be the combination of the old idea everybody has that it can never happen where a person lives because where that person lives, at leas t in America, is always normal, middle-class, and safe. The fear and horror takes place in other parts of the world, or in non-white communities, in places other than the "mythic place of white middle-class Americaââ¬â
Monday, November 18, 2019
See the file Essay Example | Topics and Well Written Essays - 1750 words
See the file - Essay Example This paper provides an insightful analysis of the thoughts of Descartes and Bentham regarding whether we should eat animals or not As mentioned earlier, Descartes argued that animals do not feeling pain even though they act as if they do. They are like machines, which can be used at anytime for any purpose. Unlike human beings, animals do not feel pain at all. This implies that when they are killed for consumption, they do not feel any pain for it. For this reason, animals can be used as food, just like the vegetables and the fruits. The fact that animal kept and domesticated just like plants implies that they can be used by human beings for food (Warren 164) . Their necks can be cut off the same way the plant tips are cut and they do not complain. In of support of the reasoning that the animals should be eaten, Descartes argues that animals do not have rights, unlike the human beings. The same way the plants are used they should be used to provide food for the human beings who are far much superior to them. Human beings do feel pain especially when they are cut. This, according to Descartes, is unlike to happen to the animal (Pickering and Norman 513). Animals should be treated like the machines since they are like the objects; the same way we use a tractor to plough. Moreover, he argues that anything that feels pain should be pitied. Human beings are emotional beings; if the animals were feeling pain they would be pitied. According to him, it would be so remorseful to see the animals go through the painful state of being slaughtered. Since them do not feel any of these they should be killed according the human beingââ¬â¢s wish. It can be so remorseful to see a fellow human being slaughter unlike an animal. The cry of the fellow human being can make another human being feel sad or cry as a result. If animals were emotional, they would cry if they see a human being slaughter a fellow animal. Animals should be eaten as they eat one another, this show that they
Friday, November 15, 2019
Protection of Biometric Templates
Protection of Biometric Templates Protection of Biometric Templates Stored on an Authentication Card by Salting the Templates Problem Statement The proposed research addresses the problem of protection of biometric data stored on templates using a system-on-card approach for smart cards by proposing a method to salt the templates. Research Statement This research proposes a robust and resilient method to salt the templates stored and matched on-card. It prepares a salt using a fingerprint template of a randomly chosen finger, the serial number of authentication card and a system generated random PIN. The salt is used to encrypt the templates of different fingerprint templates created and stored on card. During authentication, a template of the finger chosen randomly to prepare the salt during the enrollment phase is obtained and a PIN is provided by user. These two inputs along with the serial number of card is used to prepare the salt and again encrypt the live template provided by user for authentication. Once, the stored encrypted template and the created encrypted template matches, the user can be considered genuine and granted access further. This method is implemented on system-on-card smart cards to provide users more security and privacy. Abstract This research proposes to provide a secure method to prepare salt for encryption of templates stored on the authentication card using what I am, what I have and what I know which is highly resistant to known attacks against match on card technology. The user will be provided with a Java card with an embedded fingerprint reader on the card. The user has to provide a fingerprint which will be captured by reader embedded on-card and this fingerprint will be used to prepare salt along with serial number of Java card and a 4-digit PIN input by user. The salt will be prepared to encrypt the live template of another fingerprint chosen randomly by system, generated by the system on Java card. The encrypted live template and the stored salted template will be compared to establish if the user is genuine or not. The user will be authenticated based on the values of decision if it passes a certain threshold value. Resources The resources we intend to use to complete this research is Google Scholar, IEEE Xplore, Research Gate. Connection to the courses of the MISSM Program Various courses of MISSM program are linked to the proposed research as described below: Cryptography: The basics of Biometrics and JAVA card technology, using challenge and response for any type of environment such as banking, high-security settings etc. Also, RSA certificates for web authentication during communication with server. Security policies: Different policies and standards governing the management of biometric data i.e. ISO/IEC standards etc. Also, different policies that can be implemented to ensure sound use of proposed method. Governance Risk and Control: Considering the advantage of defense-in-depth concept by adding an additional layer of security for the notion of risk management in physical access authentication /security. Review of related research The research related to this proposal contains the discussion of match-on card and system-on-card approach and how system-on-card technology provides additional security and privacy to user. The review is divided into four section as described below: Fingerprint Authentication Systems Biometrics are automated methods of establishing a persons identity based on his/her physical or behavioral characteristics [1]. There are various physical characteristics that can be used for authentication system such as iris, fingerprint, palmprint, hand vein pattern etc. For each biometric authentication system, a biometric is chosen based on various factors such as Universality, Uniqueness, Accuracy, Maturity, Durability as described in Smart Cards and Biometrics [2]. Fingerprints is most widely used from the date of origin of biometrics. The following matrix table clearly shows that fingerprint is most suitable biometric trait that can be used. Fig 1. Report of Defense Science Board Task Force on Defense Biometrics [2] Like any other authentication system, fingerprint authentication system also consists of four basic fundamental components Input mechanism, Matching methodologies, Decision making procedures and database of biometric information. A conventional biometric authentication system consists of two phases: Enrollment and Verification as explained in Fig 2 [3]. Fig 2. Framework for Fingerprint Authentication System [3] During Enrollment phase, user is asked to input a fingerprint. Different features are extracted from this fingerprint and a template is created by a one-way function that transforms the features extracted into a mathematical form using different functions. This template is stored in a database which is used during second phase of authentication i.e. Verification. During Verification phase, user is again asked to provide fingerprint. Again a template called live template from the input fingerprint is generated and then the stored template in database and live template are compared to authenticate the user as genuine or not. The proposed research focus on template protection algorithm to protect the biometric template (or reference) before storing them in database. Templates are generated by extracting specific features from a biometric trait (in this case it is fingerprint) of user. The template is a short hand description [12] which provides essential information about the original fingerprint. Templates can be stored in database as such without passing them through any protection algorithm, which will save time and less resources are required for whole process. But unprotected templates are very serious threat to the integrity of whole fingerprint authentication system (or any biometric authentication system). Also, the template can be easily manipulated and is used for speed of comparison. As demonstrated by Ross et. al. in [13] that information can be extracted out of the template and original fingerprint can be regenerated.Ãâà In their paper, three level of information was obtained from the minutiae template of fingerprint. The information about orientation field, fingerprint class and friction ridge structure was extracted out and based on that information the fingerprint was synthesized again. It proves the notion that getting original fingerprint from the template is nearly impossible to be untrue. Hence, the protection of template is very crucial and cannot be ignored. Fingerprint templates are generated from specific features of the fingerprint input by user. Fingerprint template includes information for each minutiae point, such are position of the point on an XY-axis, distance of one minutia from all others or gradient information of each minutia. Gradient information gives the slope of the line segment extending from minutia being described [12] as shown in fig. All this information for each minutia of a finger makes a fingerprint template for a finger. Similarly, template for each finger can be constructed and stored in database. Templates can be a two dimensional matrix in which rows represents each minutia and column represents different type of information about that minutia. Examples of standardized and widely used template formats are ANSI INCITS 378-2004 and ISO/IEC 19794-2. ANSI INCITS 378-2004 template format consist of three standards for fingerprint data interchange which are as follows: ANSI INCITS 377-2004 Finger Pattern Data Interchange Format This standard defines the content, format and units of measurement for the exchange of finger image data that may be used in the verification or identification process of a subject [14]. It exchanges unprocessed image of fingerprint. This standard is used where there is no limit on the resources such as storage and transmission time. ANSI INCITS 378-2004 Finger Minutiae Format For Data Interchange The Finger Minutiae Format for Data Interchange standard specifies a method of creating biometric templates of fingerprint minutiae, such as ridge endings and bifurcations [14]. The structure of minutia data format is defined in the figure below. The extended data blocks contain additional information about the minutia. Fig Structure Minutia Data Format extracted out from [14]. ANSI INCITS 381-2004 Finger Image-Based Data Interchange Format The Finger Pattern Based Interchange Format standard specifies a method of creating biometric templates of fingerprint biometric information using ridge pattern measurements found in fingerprints. The fingerprint image is reduced and then grouped into small cells of 5*5 pixels. Then these cells are analyzed separately [14]. The template generated may be used for two principal purposes [14] which are identification and verification. In both cases a live template is generated from fingerprint input by user is compared with the template stored in database. The chances of these two templates being an exact match is very small because of dirt, injury or poor quality of fingerprint itself [14]. Therefore, a threshold value is specified which is called a correlation coefficient [14]. The value of this coefficient must be set particular to the application. This is because, if this value is high then there a high chance of FRR and if this value is low, then there is high chance of FAR. Examples of application of fingerprint authentication system are law enforcement for identification of criminals, airports to provide rapid services to a high number of passengers etc. In a conventional fingerprint authentication system, there are various points of attack as identified by Ratha et. al. [4] which can be exploited by an adversary as seen in Fig 3 [5]. Different attacks that can be performed on these points can be grouped into four categories [5]: Attacks at user interface: These types of attacks use fake finger made of gelatin or latex and fabricated fingerprint is given as input to reader device that captures the fingerprint. These types of attacks can be mitigated by developing hardware and software solutions more sensitive to the liveness of the fingerprint. Attacks at interfaces between modules: Different modules of fingerprint authentication systems communicate with each other. For example, fingerprint reader sends the fingerprint image to feature extractor module (Fig 3) through a communication channel. And if, this channel is not secured physically or cryptographically [5] then the data can be intercepted and attacker can get access to the original fingerprint. Another attack that can be performed is to launch replay or hill- climbing attacks [5]. Attacks on the modules: An adversary can attack either the communication channel or the modules itself. If the channel is secured using cryptographic measures that does not secure the entire authentication system. An attacker can execute various attacks to take possession of modules and force them to work according to his/her will and intentions. This can cause system to deny even the legitimate user and allow illegitimate user by feeding wrong input or modifying the decision. Attacks on the template database: The templates stored in database can be attacked and is one of the most potentially damaging attack [5]. These attacks can be performed either to modify the templates or retrieve the original fingerprint. Fig 3. Points of attack in a generic biometric authentication system [5] All these attacks can compromise the authentication system and present a threat to access privileges of sensitive data or location. Some of the attacks that can be performed and described in figure above include presenting synthetic finger made from either silicone or gelatin. This synthetic finger has a fingerprint printed on the side facing the sensor. Then this fake finger is used to give system input. This attack can be countered by improving the liveness detection of the hardware as well as software as described in [15]. Replay of old data can be mitigated by limiting the number of attempts an individual can make before permanently locking out the person from the system. Communication channel which is used to transmit template from database to matcher module can be intercepted and template can be obtained while in transit. So, additional security measures are needed to be taken such as establishing encrypted channels which is again an overhead. If the template is modified in tra nsit, then attacker can perform DoS attack and prevent genuine user from getting access to the system. Similarly, if the final decision can be modified and allows the foster to enter into system. Also, if the matcher is overridden by attacker then the decision of the matching is compromised without any doubt and hence, the whole system is compromised. Smart Card Smart cards are also called Integrated Circuits Card (ICC) in ISO/IEC 7816 standard. These types of cards are made of plastic with a metallic chip inside it. There are two types of chips as described in [11] which are memory chips and microprocessor chips. Memory chips consists of control logic [11] and are used for storage purposes. These chips are used to store data only. Whereas, microprocessor chips have a programmable processing unit along with a calculation unit and little storage to carry put various operations. A plastic card with microprocessor chip is called smart card [11]. These type of cards can be used for various purposes such as payment, authentication, document storage, portable files storage etc. For different applications of the smart card require different operations to be performed by CPU embedded in the chip. CPU of the smart cards require power to carry out the operations which is the reason that a card reader device is necessary component of the authentication system. The smart card and card reader terminal communicates with each other to transfer data. Terminal requires different information and responses from the card to carry out the desired operations. To get required service, terminal sends a request to the card which is received by on-card application and executes the operations as requested and provide terminal with responses. The communication between the card and the terminal is protected by establishing a secure channel. Also, different cryptographic algorithms are used for protection of information transmitted between terminal and the card. These algorithms are processed using the calculation unit embedded in the microprocessor chip. The secure channel is established using cryptographic protocols. The transmission occurs similar to communication using OSI reference model [11]. The transmission of data between card and the reader takes place in units called APDU (Application Protocol Data Unit). There are two types of APDUs which are categorized as command APDUs and response APDUs.Ãâà ISO/IEC 7816-4 defines a command set consisting of various commands (some are mandatory and others are optional) for development of the applications by different industries. The basic idea behind this approach is that an application developed by any vendor will be compatible with the chip card. Structure of APDU can be found in Appendix. Smart cards have card managers to administer and manage all the card system services [12] and operations. It can be viewed as an entity that provides functions very similar to runtime environment of card, represents the card issuer and verifies the users identity. It can also be seen as three different entities as described in GlobalPlatform Card Specification 2.1.1, as follows: The GlobalPlatform Environment The Issuer Security Domain The Cardholder Verification Methods Issuer Security Domain can be considered as entity representing card issuer on-card. It consists of data that shall be stored on-card as listed below [12]: Sr, No, Name (Tag of ISO/IEC 7816) Description a. Issuer Identification Number (Tag 42) Maps the card to a particular card management system. It is of variable length. b. Card Image Number (Tag 45) Used by card management system to identify the card among its database. Also, has variable length. c. Card Recognition Data Provides information about the card before communication starts between card and card management system. It is contained in Directory Discretionary Template (Tag 73) d. On-card key Information Different keys are stored in persistent memory of card. Key consists of various attributes such as key identifier, key version number, associated cryptographic algorithm and key length. All key components associated with an entity (e.g. symmetric and asymmetric key are two different entities) has same key identifier Keys are managed by Issuer Security Domain These data in Issuer Security Domain can be accessed using GET DATA command. Fingerprint Match-on-card and Fingerprint System-on-card In a conventional biometric authentication system, a template generated during verification is sent to server where it is matched with the stored template in database. Live template must be protected against attacks while in transit to server. Even though templates are results of one-way function but original fingerprint image can still be prepared using different attacks. To address the problem of template compromise in transit, modules of biometric authentication systems described in Fig 3 can be grouped together. These types of groupings can be used to counter the attacks described above. In the article Encyclopedia of Biometric, Chen Tai Pang, Yau Wei Yun, Jiang Xudong and Mui keng Terrence explained four different types of approaches that can be taken to group the modules and placing grouped components of authentication system on an authentication card (which is also called a smart card) such as Java card. These approaches are a) Template on-card b) Match-on-card c) Work sharing on-card d) System-on-card This research focuses on limitations of Match-on-card approach and features of System-on-card approach that overcome these limitations. These approaches are described below. Also, the limitations and how they affect the integrity of biometric authentication system is also defined. Match-on-card is defined as the process of performing comparison and decision making on an integrated circuit (IC) card or smartcard where the biometric reference data is retained on-card to enhance security and privacy [6]. During enrollment, the template generated from the fingerprint is stored on the secure area of cards storage. To accomplish on-card matching, live template is generated after capturing and feature extraction of fingerprint of user using an interface device. This live template is uploaded to the card for verification process. On-card matching follows the same process flow as defined in fig 4 but with Matcher and Database module that has stored template on-card. Matching function executes on- card rather than on a server. This solves the problem of attack on interfaces of modules described above. Fig 3 explains match-on-card process for biometric verification [6]. Fig 4. On-card matching process [6] User inputs his/her fingerprint using Biometric terminal. Features are extracted from the input and a live template (or here its called query template) is generated. This query template is generated off-card but sent to card for matching. Cards matcher module retrieves the stored template from the secure storage area of card and compare two templates. This comparison result is handed over to on-card application and thus, original template and the result always resides on the card. Dotted line represents the application firewall that restricts the access of application to matching module [6]. Attacks on interfaces between modules also stems to attacks on database in which templates are stored. If the interfaces or the communication channel is compromised, then the data travelling among different modules can also be compromised. If not intercepted, at least modification can be performed to execute DoS attack for a legitimate user. To deal with this limitation, system-on-card approach can be used. System-on-card means the whole biometric verification process, including the acquisition, is performed on the smartcard. The smartcard incorporates the entire biometric sensor, with processor and algorithm [6]. Fig 5. System-on-card Technology [6] Smartcard equipped with fingerprint reader is inserted into an interface device which provides time and power to card. Then user is asked to provide his/her fingerprint which is captured by the fingerprint reader on-card. Different features are extracted out from the fingerprint and different incorporated algorithms on-card [6] transforms that input into a mathematical form (template). The template is stored in secure area of cards storage. The whole process takes place on-card providing more security and privacy to user. System-on-card is more secure because the template stored and query template is always present on-card and only the result is sent to host-side application. Template Security This research focus on the security of the template before storing it in database. Fingerprint of an individual is very unique. It makes it an ideal factor for authentication systems. No two persons can have same fingerprints providing high security, privacy and integrity to authentication systems using fingerprint. Even though this makes the biometrics strong among all other factors of authentication but it also is its weakest point. Unlike any other computational algorithms, biometric information of a person is unique and once compromised, cannot be recreated. It makes the protection of templates very crucial to protect the integrity of biometric authentication systems. Two approaches can be considered to secure the templates. Either, a) database can be protected against different attacks by implementing various security measures such as firewalls or b) templates can itself be protected against attacks so that even if the database is compromised, original fingerprint can still be protected. Since, the template itself is very specific information which makes it quite useless for attacker to get original fingerprint image from template. But it is still possible to create original fingerprint using the algorithm defined in [13]. According to ISO/IEC 24745 [7] standard, all the Biometric Template Protection Systems must fulfill three main requirements: Noninvertibility: It should very difficult to retrieve the original template from the final protected template reference stored in database. The noninvertibility prevents the abuse of stored biometric data for launching spoof or replay attacks, thereby improving the security of the biometric system [3]. Revocability: It should be computationally difficult to obtain the original biometric template from multiple instances of protected biometric reference derived from the same biometric trait of an individual [3]. It makes it possible for issuer to issue a new template to user in case of a compromise, without bothering about the probability of success for an attacker using the old template. Nonlinkability: It should be tough to establish relationship among different instances of templates derived from same biometric characteristic of user. The nonlinkability property prevents cross-matching across different applications, thereby preserving the privacy of the individual [3]. Methods for Biometric Template Protection As described by Anil K. Jain, Karthik Nandakumar and Abhishek Nagar in their article Biometric Template Security [8], Template protection schemes can be categorized into two main groups viz. feature transformation and biometric cryptosystem as shown in fig 6. Fig 6. Template Protection approaches [8] In feature transformation, a feature transformation function is applied to the biometric template [8]. The new template generated after feature transformations is stored in database rather than the template generated after feature extraction. This transformation provides more security because it makes the template more random and make it almost impossible for attacker to guess the original template and hence more difficult to obtain original fingerprint image. Two methods for feature transformation are: Salting and Nonivertible transform. Salting: It is also called biohashing. In this approach a biometric template (fingerprint template, here) is taken as input and a mathematical function is applied defined by a specific key. A token number or a key is used to increase the entropy of the template and so makes the template difficult for attacker to guess [2]. Salting is the name given because the key used in this method is called salt to protect the template. This approach is invertible which means using the key, original template can be obtained from transformed template. Transformation function that satisfy the requirements of this approach can be designed. Noninvertible Transform: This approach is similar to previous one i.e. salting with a little difference that this method is invertible which means a transformed template is very difficult to invert to original template. Non-invertible transform refers to a one-way function that is easy to compute but hard to invert [8]. Hence, more security is provided in this approach because if the key is known to attacker, he/she still cannot retrieve original template. Comparing these two approaches based on the description above, non-invertible transform seems an obvious choice for security. But thats not true. This is so because, salting in invertible but it supports revocability property of biometric template protection. It means if a key is leaked and transformed template is accessible to attacker then the template can be easily replaced using a new key. Also, key usage causes low FAR. Whereas, non-invertible transform presents a tradeoff between discriminability and non-invertibility [8]. It means the transformed template using different features of same user should be same but different from another user along with fulfilling noninvertible property. It is difficult to design such transformation function [8]. Salting is done using a specific key or token. Any key or token used for salting is secure Description of Proposed Research Considering the above knowledge, the research will focus on a method to protect the template stored on card. The proposed method will protect biometric template stored on card by salting the template. The research will focus mainly on the proposed method of salting the template. Also, other elements as required will be included in the research to propose a robust and secure system that use the method for salting. It is assumed that enrollment phase is done in a secure environment and verification phase can be done in an untrusted zone. The research will look deep into the method to develop a more random and strong salt for biometric template protection. System-on-card approach will be used because of the privacy and security level provided is maximum as shown in Fig 7. All the computation and execution is done on card and the terminal is only sent the final YES/NO to grant access to user. The method uses following elements: Authentication card with fingerprint reader embedded on card Various Templates Random Number Generator Serial Number of Java Card PIN Cryptographic Certificates using RSA asymmetric key cryptography Counter The proposed method uses three fundamental components of biometric authentication system: Who am I (Live Template) What I have (Authentication Card) What I know (PIN) These three components are not only used for authentication of a user but also for salting the template stored on card. At the time of enrollment, Java card with fingerprint reader is inserted into the terminal (to provide power and time to card). User is asked to input fingerprint (who I am) of a finger chosen randomly by system. Then the system generates salt using serial number of Java card (what I have) and randomly generated 4-digit PIN (what I know). User has to remember this PIN for verification as it will be forgotten forever after enrollment process is finished. Salt prepared by combining three components is then used to encrypt the templates to be stored on the card. Fig 7. Java card with fingerprint reader Salt prepared can be written in a generalized form as: Salt = Serial number of authentication card + Template of fingerprint from a finger chosen randomly + Randomly generated PIN by enrollment system. During verification, the users inserts the card into terminal and has to provide: Fingerprint used during enrollment phase to prepare salt 4-digit PIN Using these inputs and the serial number stored on the chip of Java card, the salt is prepared again. Then user is asked again to provide fingerprint of a randomly chosen finger by system. A query template is generated again and is salted using the salt prepared. Then two salted templates are compared, and if decision pass the threshold value then user can be considered authentic and the decision is sent to server through terminal to grant user access. Certificated signed with digital signatures using RSA asymmetric encryption (using 4096 bits) are used for communicating the decision with server. Each time a decision is sent to server, counter on server increments by 1, if the user fails to authenticate otherwise resets to zero. If the counter reaches 4 (user fails to authenticate itself 4 times consecutively) then the Java card is blocked and requires reset by issuing body. Performing all the activities (from reading fingerprint to decision making) on-card, provides highest security, little privacy concern, interoperability, scalability and mobility [9]. To summarize the whole process, it can
Wednesday, November 13, 2019
Jane Eyre and Her Struggles Essay -- essays research papers
Jane Eyre and Her Struggles Jane Eyre is a classic English novel which follows the development of a young woman in the mid 1800's. Jane grows to be a smart, self supporting, independent woman. This becomes a struggle for her as she was brought up to live in the lower-class. Throughout this novel, Jane tries to show that class and gender should not affect personality. This novel explains Janeââ¬â¢s struggle against societal expectations of class and of gender. Janeââ¬â¢s initial struggle begins as she is brought up by her aunt. Jane is living in an upper-class household and is being treated as a person of the lower-class. Jane would be antagonized on a daily basis by the Reed children. As an outcast, Jane realizes at an early age how much class affects the behavior of people in society. Jane would be punished by Mrs. Reed regularly, which may have fueled her rebellious nature. A specific example would be when Jane was sent to the ââ¬Å"red roomâ⬠by Mrs. Reed as punishment for fighting with her son. This was the room where Mrs. Reedââ¬â¢s husband was found dead. This shows that Mrs. Reed had absolutely no respect for Jane as an individual as Mrs. Reed knew that Jane believed that the room was haunted. This event also shows that Mrs. Reed does not respect her deceased husband, as she abandoned the room after he was found. Soon after, Jane decides that she would like to go to school. Mr. Brocklehurst, founder of Lowood School admits Jane to the school. Mrs. Reed then explains to him that Jane is a problematic child. As soon as he leaves the household, Jane verbally attacks Mrs. Reed and has a feeling of accomplishment. Name 2 Janeââ¬â¢s initial confrontation with Mr. Brocklehurst inside the school leaves her in misery as she i... ...he was teaching the children. Eventually, when St. John attempts to ask Jane for her hand in marriage, she rejects him. He told her that it would only be in business, as he was to become a missionary and wanted her to help him. Jane does not believe in that kind of matrimony, so that was why she denied him. St. Johnââ¬â¢s two sisters, like Jane were very intellectual and loved to read. Jane loved having conversations with them, as they were as intellectual as she was. These characters raised Janeââ¬â¢s expectations of society. This classic English novel focuses on Janeââ¬â¢s struggle against societal expectations of class and of gender. Jane had many struggles with many characters throughout the novel, and this essay focused on some of the most important characters and the most important instances. Those struggles helped her become a smart, independent woman.
Subscribe to:
Posts (Atom)