LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY

Preview:

DESCRIPTION

LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY. PRIVACY AUTHENTICATION VERIFICATION. LEARNING OUTCOME :. List way to protect privacy State authentication and verification methods / technologies. What is Privacy ?. in IT refers to data and information privacy. - PowerPoint PPT Presentation

Citation preview

LEARNING AREA 1 : INFORMATION AND

COMMUNICATION TECHNOLOGY

PRIVACYAUTHENTICATION

VERIFICATION

LEARNING OUTCOME :• List way to protect privacy

• State authentication and verification methods / technologies

What is Privacy ?• in IT refers to data and information privacy

How does computer technology threaten the privacy of our data?

1. Cookiesare used to identify users by web casting, e-commerce and other web applications.

2. Electronic profilecombining of data in a database that can be sold to the Internet by the company to the interested parties.

3. Spywarerefers to a program that collects user information without the user’s knowledge.

Example of cookies :

Example of internet profile :

Example of spyware:

WHY DO WE NEED PRIVACY?• We need privacy for anonymity.• We also need privacy for confidentiality.

Privacy can be protected by:(a) Privacy law(b) Utilities software

Ways to protect privacy1. Look for privacy policies on web sites.2. Get a separate account for your personal e-mail.3. Teach your kids that giving out personal information online means

giving it to strangers.4. Clear your memory cache after browsing.5. Make sure that online forms are secure.6. Reject unnecessary cookies.7. Use anonymous remailers.8. Keep your e-mail private, use encryption.9. Use anonymizers while browsing.10. Purchase goods with cash, rather than credit card.11. Install personal firewall.12. Fill in only necessary information on warranty and registration form.

AUTHENTICATION• Process where user verifies their identity.• 2 methods :

1. Callback system

2. Biometric

device

Example of callback system

something you are2

VERIFICATION• Act of proving or disproving the correctness of a system with

respect to a certain formal specification.• 2 methods are :

1. User

identification

2. Processed

object

Pin number

*********Password

*********

something you know1

2 something you have

Smart Card

ATM Card

Credit CardSecurity Token

Pin number Password

Something you know

Something you have

Static Password

Dynamic Password 342601Something you have

Something you know

SECURITY TOKENA security token is a small handheld device

that dynamically generates and displays a password.

CONCLUSION• 12 ways to protect privacy. • 2 commonly authentication methods are :

– Biometric device (something you are – part of user’s body)• Fingerprint recognition, facial recognition, hand

geometry scanning, iris scanning, retinal scanning, voice recognition, signature verification system.

– Callback system • Used in the bank operation and business

transaction.

CONCLUSION• 2 commonly verification methods are :

–User identification (something you know – have to remember)• Pin number or password

–Possessed object (something you have – an object)• Atm card, credit card, key, security token

and smart card

Recommended