290 likes | 394 Views
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY. PRIVACY AUTHENTICATION VERIFICATION. LEARNING OUTCOME :. List way to protect privacy State authentication and verification methods / technologies. What is Privacy ?. in IT refers to data and information privacy.
E N D
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION
LEARNING OUTCOME : • List way to protectprivacy • State authentication and verificationmethods / technologies
What is Privacy ? • in IT refers to data and information privacy How does computer technology threaten the privacy of our data? • 1. Cookies • are used to identify users by web casting, e-commerce and other web applications. • 2. Electronic profile • combining of data in a database that can be sold to the Internet by the company to the interested parties. • 3. Spyware • refers to a program that collects user information without the user’s knowledge.
WHY DO WE NEED PRIVACY? • We need privacy for anonymity. • We also need privacy for confidentiality.
Privacy can be protected by: (a) Privacy law (b) Utilities software
Ways to protect privacy • Look for privacy policies on web sites. • Get a separate account for your personal e-mail. • Teach your kids that giving out personal information online means giving it to strangers. • Clear your memory cache after browsing. • Make sure that online forms are secure. • Reject unnecessary cookies. • Use anonymous remailers. • Keep your e-mail private, use encryption. • Use anonymizers while browsing. • Purchase goods with cash, rather than credit card. • Install personal firewall. • Fill in only necessary information on warranty and registration form.
AUTHENTICATION • Process where user verifies their identity. • 2 methods : 2. Biometric device 1. Callback system
2 BIOMETRIC DEVICE something you are
IRIS SCANNER
FINGER PRINT READER
FACIAL RECOGNITION
VERIFICATION • Act of proving or disproving the correctness of a system with respect to a certain formal specification. • 2 methods are : 1. User identification 2. Processed object
USER ID 1 something you know Password Pin number ********* *********
342601 POSSESSED OBJECT 2 something you have ATM Card Smart Card Credit Card Security Token
342601 VERIFICATION Something you know Pin number Password Something you have
342601 SECURITY TOKEN A security token is a small handheld device that dynamically generates and displays a password. Something you know Static Password Dynamic Password 342601 Something you have
CONCLUSION • 12 ways to protectprivacy. • 2 commonlyauthenticationmethods are : • Biometricdevice (somethingyou are – part of user’s body) • Fingerprint recognition, facial recognition, hand geometry scanning, iris scanning, retinal scanning, voice recognition, signature verification system. • Callback system • Used in the bankoperation and business transaction.
CONCLUSION • 2 commonlyverificationmethods are : • User identification (somethingyou know – have to remember) • Pin number or password • Possessedobject (somethingyou have – an object) • Atmcard, creditcard,key, securitytoken and smart card