1 / 29

LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY

LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY. PRIVACY AUTHENTICATION VERIFICATION. LEARNING OUTCOME :. List way to protect privacy State authentication and verification methods / technologies. What is Privacy ?. in IT refers to data and information privacy.

lysa
Download Presentation

LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION

  2. LEARNING OUTCOME : • List way to protectprivacy • State authentication and verificationmethods / technologies

  3. What is Privacy ? • in IT refers to data and information privacy How does computer technology threaten the privacy of our data? • 1. Cookies • are used to identify users by web casting, e-commerce and other web applications. • 2. Electronic profile • combining of data in a database that can be sold to the Internet by the company to the interested parties. • 3. Spyware • refers to a program that collects user information without the user’s knowledge.

  4. Example of cookies :

  5. Example of internet profile :

  6. Example of spyware:

  7. WHY DO WE NEED PRIVACY? • We need privacy for anonymity. • We also need privacy for confidentiality.

  8. Privacy can be protected by: (a) Privacy law (b) Utilities software

  9. Ways to protect privacy • Look for privacy policies on web sites. • Get a separate account for your personal e-mail. • Teach your kids that giving out personal information online means giving it to strangers. • Clear your memory cache after browsing. • Make sure that online forms are secure. • Reject unnecessary cookies. • Use anonymous remailers. • Keep your e-mail private, use encryption. • Use anonymizers while browsing. • Purchase goods with cash, rather than credit card. • Install personal firewall. • Fill in only necessary information on warranty and registration form.

  10. AUTHENTICATION • Process where user verifies their identity. • 2 methods : 2. Biometric device 1. Callback system

  11. Example of callback system

  12. 2 BIOMETRIC DEVICE something you are

  13. IRIS SCANNER

  14. FINGER PRINT READER

  15. FINGER PRINT READER

  16. HAND GEOMETRY READER

  17. HAND GEOMETRY READER

  18. FACIAL RECOGNITION

  19. VERIFICATION • Act of proving or disproving the correctness of a system with respect to a certain formal specification. • 2 methods are : 1. User identification 2. Processed object

  20. USER ID 1 something you know Password Pin number ********* *********

  21. 342601 POSSESSED OBJECT 2 something you have ATM Card Smart Card Credit Card Security Token

  22. 342601 VERIFICATION Something you know Pin number Password Something you have

  23. 342601 SECURITY TOKEN A security token is a small handheld device that dynamically generates and displays a password. Something you know Static Password Dynamic Password 342601 Something you have

  24. CONCLUSION • 12 ways to protectprivacy. • 2 commonlyauthenticationmethods are : • Biometricdevice (somethingyou are – part of user’s body) • Fingerprint recognition, facial recognition, hand geometry scanning, iris scanning, retinal scanning, voice recognition, signature verification system. • Callback system • Used in the bankoperation and business transaction.

  25. CONCLUSION • 2 commonlyverificationmethods are : • User identification (somethingyou know – have to remember) • Pin number or password • Possessedobject (somethingyou have – an object) • Atmcard, creditcard,key, securitytoken and smart card

More Related