learning area 1 : information and communication technology

29
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION

Upload: lysa

Post on 25-Feb-2016

28 views

Category:

Documents


2 download

DESCRIPTION

LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY. PRIVACY AUTHENTICATION VERIFICATION. LEARNING OUTCOME :. List way to protect privacy State authentication and verification methods / technologies. What is Privacy ?. in IT refers to data and information privacy. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

LEARNING AREA 1 : INFORMATION AND

COMMUNICATION TECHNOLOGY

PRIVACYAUTHENTICATION

VERIFICATION

Page 2: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

LEARNING OUTCOME :• List way to protect privacy

• State authentication and verification methods / technologies

Page 3: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

What is Privacy ?• in IT refers to data and information privacy

How does computer technology threaten the privacy of our data?

1. Cookiesare used to identify users by web casting, e-commerce and other web applications.

2. Electronic profilecombining of data in a database that can be sold to the Internet by the company to the interested parties.

3. Spywarerefers to a program that collects user information without the user’s knowledge.

Page 4: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

Example of cookies :

Page 5: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

Example of internet profile :

Page 6: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

Example of spyware:

Page 7: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

WHY DO WE NEED PRIVACY?• We need privacy for anonymity.• We also need privacy for confidentiality.

Page 8: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

Privacy can be protected by:(a) Privacy law(b) Utilities software

Page 9: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

Ways to protect privacy1. Look for privacy policies on web sites.2. Get a separate account for your personal e-mail.3. Teach your kids that giving out personal information online means

giving it to strangers.4. Clear your memory cache after browsing.5. Make sure that online forms are secure.6. Reject unnecessary cookies.7. Use anonymous remailers.8. Keep your e-mail private, use encryption.9. Use anonymizers while browsing.10. Purchase goods with cash, rather than credit card.11. Install personal firewall.12. Fill in only necessary information on warranty and registration form.

Page 10: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

AUTHENTICATION• Process where user verifies their identity.• 2 methods :

1. Callback system

2. Biometric

device

Page 11: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

Example of callback system

Page 12: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

something you are2

Page 13: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY
Page 14: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY
Page 15: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY
Page 16: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY
Page 17: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY
Page 18: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY
Page 19: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY
Page 20: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY
Page 21: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY
Page 22: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY
Page 23: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

VERIFICATION• Act of proving or disproving the correctness of a system with

respect to a certain formal specification.• 2 methods are :

1. User

identification

2. Processed

object

Page 24: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

Pin number

*********Password

*********

something you know1

Page 25: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

2 something you have

Smart Card

ATM Card

Credit CardSecurity Token

Page 26: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

Pin number Password

Something you know

Something you have

Page 27: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

Static Password

Dynamic Password 342601Something you have

Something you know

SECURITY TOKENA security token is a small handheld device

that dynamically generates and displays a password.

Page 28: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

CONCLUSION• 12 ways to protect privacy. • 2 commonly authentication methods are :

– Biometric device (something you are – part of user’s body)• Fingerprint recognition, facial recognition, hand

geometry scanning, iris scanning, retinal scanning, voice recognition, signature verification system.

– Callback system • Used in the bank operation and business

transaction.

Page 29: LEARNING AREA 1 :  INFORMATION AND COMMUNICATION TECHNOLOGY

CONCLUSION• 2 commonly verification methods are :

–User identification (something you know – have to remember)• Pin number or password

–Possessed object (something you have – an object)• Atm card, credit card, key, security token

and smart card