LEARNING AREA 1 :
INFORMATION AND
COMMUNICATION TECHNOLOGY
PRIVACY
AUTHENTICATION
VERIFICATION
LEARNING OUTCOME :
•
List
way
to
protect
privacy
•
State
authentication
and
verification
methods
/
technologies
What is Privacy ?
•
in IT refers to data and information privacy
How does computer technology threaten
the privacy of our data?
1. Cookies
are used to identify users by web casting, e
-
commerce and other web
applications.
2. Electronic profile
combining of data in a database that can be sold to the Internet by the
company to the interested parties.
3. Spyware
refers to a program that collects user information without the user’s
knowledge.
Example of cookies :
Example of internet profile :
Example of spyware:
WHY DO WE NEED PRIVACY?
•
We need privacy for anonymity.
•
We also need privacy for confidentiality.
Privacy can be protected by:
(a) Privacy law
(b) Utilities software
Ways to protect privacy
1.
Look for
privacy policies
on web sites.
2.
Get a
separate account
for your personal e
-
mail.
3.
Teach your kids
that giving out personal information online means
giving it to strangers.
4.
Clear your memory
cache after browsing.
5.
Make sure that
online forms are secure
.
6.
Reject
unnecessary cookies.
7.
Use
anonymous
remailers.
8.
Keep your e
-
mail
private
, use encryption.
9.
Use
anonymizers
while browsing.
10.
Purchase goods with
cash,
rather than credit card.
11.
Install personal
firewall
.
12.
Fill in only
necessary information
on warranty and registration form.
AUTHENTICATION
•
Process where user
verifies their identity
.
•
2 methods :
1.
Callback
system
2.
Biometric
device
Example of callback system
something you are
2
VERIFICATION
•
Act
of proving or disproving the
correctness of a system
with respect to a certain formal specification.
•
2 methods are :
1.
User
identification
2.
Processed
object
Pin number
*********
Password
*********
something you know
1
2
something you have
Smart Card
ATM Card
Security Token
Pin number
Password
Something you know
Something you have
Static Password
Dynamic Password
342601
Something you have
Something you know
SECURITY TOKEN
A security token is a small
handheld device
that dynamically
generates
and
displays a password
.
CONCLUSION
•
12
ways
to
protect
privacy
.
•
2
commonly
authentication
methods
are :
–
Biometric
device
(
something
you
are
–
part of
user’s
body)
•
Fingerprint
recognition, facial recognition,
hand
geometry
scanning, iris scanning,
retinal
scanning,
voice
recognition, signature
verification
system.
–
Callback system
•
Used
in the
bank
operation
and business
transaction.
CONCLUSION
•
2
commonly
verification
methods
are :
–
User identification (
something
you
know
–
have to
remember
)
•
Pin
number
or
password
–
Possessed
object
(
something
you
have
–
an
object
)
•
Atm
card
,
credit
card
,
key
,
security
token
and smart
card
Enter the password to open this PDF file:
File name:
-
File size:
-
Title:
-
Author:
-
Subject:
-
Keywords:
-
Creation Date:
-
Modification Date:
-
Creator:
-
PDF Producer:
-
PDF Version:
-
Page Count:
-
Preparing document for printing…
0%
Comments 0
Log in to post a comment