LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY
description
Transcript of LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY
LEARNING AREA 1 : INFORMATION AND
COMMUNICATION TECHNOLOGY
PRIVACYAUTHENTICATION
VERIFICATION
LEARNING OUTCOME :• List way to protect privacy
• State authentication and verification methods / technologies
What is Privacy ?• in IT refers to data and information privacy
How does computer technology threaten the privacy of our data?
1. Cookiesare used to identify users by web casting, e-commerce and other web applications.
2. Electronic profilecombining of data in a database that can be sold to the Internet by the company to the interested parties.
3. Spywarerefers to a program that collects user information without the user’s knowledge.
Example of cookies :
Example of internet profile :
Example of spyware:
WHY DO WE NEED PRIVACY?• We need privacy for anonymity.• We also need privacy for confidentiality.
Privacy can be protected by:(a) Privacy law(b) Utilities software
Ways to protect privacy1. Look for privacy policies on web sites.2. Get a separate account for your personal e-mail.3. Teach your kids that giving out personal information online means
giving it to strangers.4. Clear your memory cache after browsing.5. Make sure that online forms are secure.6. Reject unnecessary cookies.7. Use anonymous remailers.8. Keep your e-mail private, use encryption.9. Use anonymizers while browsing.10. Purchase goods with cash, rather than credit card.11. Install personal firewall.12. Fill in only necessary information on warranty and registration form.
AUTHENTICATION• Process where user verifies their identity.• 2 methods :
1. Callback system
2. Biometric
device
Example of callback system
something you are2
VERIFICATION• Act of proving or disproving the correctness of a system with
respect to a certain formal specification.• 2 methods are :
1. User
identification
2. Processed
object
Pin number
*********Password
*********
something you know1
2 something you have
Smart Card
ATM Card
Credit CardSecurity Token
Pin number Password
Something you know
Something you have
Static Password
Dynamic Password 342601Something you have
Something you know
SECURITY TOKENA security token is a small handheld device
that dynamically generates and displays a password.
CONCLUSION• 12 ways to protect privacy. • 2 commonly authentication methods are :
– Biometric device (something you are – part of user’s body)• Fingerprint recognition, facial recognition, hand
geometry scanning, iris scanning, retinal scanning, voice recognition, signature verification system.
– Callback system • Used in the bank operation and business
transaction.
CONCLUSION• 2 commonly verification methods are :
–User identification (something you know – have to remember)• Pin number or password
–Possessed object (something you have – an object)• Atm card, credit card, key, security token
and smart card