What is Privacy - RMM ICT GROUP

parisfawnΤεχνίτη Νοημοσύνη και Ρομποτική

17 Νοε 2013 (πριν από 3 χρόνια και 8 μήνες)

62 εμφανίσεις

LEARNING AREA 1 :

INFORMATION AND
COMMUNICATION TECHNOLOGY

PRIVACY

AUTHENTICATION

VERIFICATION

LEARNING OUTCOME :


List

way

to

protect

privacy



State

authentication

and

verification

methods

/

technologies

What is Privacy ?


in IT refers to data and information privacy

How does computer technology threaten
the privacy of our data?


1. Cookies

are used to identify users by web casting, e
-
commerce and other web
applications.


2. Electronic profile

combining of data in a database that can be sold to the Internet by the
company to the interested parties.


3. Spyware

refers to a program that collects user information without the user’s
knowledge.

Example of cookies :

Example of internet profile :

Example of spyware:

WHY DO WE NEED PRIVACY?


We need privacy for anonymity.


We also need privacy for confidentiality.


Privacy can be protected by:

(a) Privacy law

(b) Utilities software



Ways to protect privacy

1.
Look for
privacy policies
on web sites.

2.
Get a
separate account
for your personal e
-
mail.

3.
Teach your kids
that giving out personal information online means
giving it to strangers.

4.
Clear your memory
cache after browsing.

5.
Make sure that
online forms are secure
.

6.
Reject

unnecessary cookies.

7.
Use
anonymous

remailers.

8.
Keep your e
-
mail
private
, use encryption.

9.
Use
anonymizers

while browsing.

10.
Purchase goods with
cash,
rather than credit card.

11.
Install personal
firewall
.

12.
Fill in only
necessary information
on warranty and registration form.


AUTHENTICATION


Process where user
verifies their identity
.


2 methods :

1.
Callback
system

2.
Biometric
device

Example of callback system

something you are

2

VERIFICATION


Act
of proving or disproving the
correctness of a system
with respect to a certain formal specification.


2 methods are :

1.

User
identification

2.
Processed
object

Pin number

*********

Password

*********

something you know

1

2

something you have

Smart Card

ATM Card

Security Token

Pin number

Password

Something you know

Something you have

Static Password

Dynamic Password

342601

Something you have

Something you know

SECURITY TOKEN

A security token is a small

handheld device


that dynamically
generates

and
displays a password
.

CONCLUSION


12
ways

to
protect

privacy
.


2
commonly

authentication

methods

are :


Biometric

device

(
something

you

are


part of
user’s

body)


Fingerprint

recognition, facial recognition,
hand
geometry

scanning, iris scanning,
retinal

scanning,
voice

recognition, signature
verification

system.


Callback system


Used

in the
bank

operation

and business
transaction.

CONCLUSION


2
commonly

verification

methods

are :


User identification (
something

you

know


have to
remember
)


Pin
number

or
password


Possessed

object

(
something

you

have


an
object
)


Atm

card
,
credit

card
,

key
,
security

token

and smart
card