2011 5-privacy

29
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION

Transcript of 2011 5-privacy

Page 1: 2011 5-privacy

LEARNING AREA 1 : INFORMATION AND

COMMUNICATION TECHNOLOGY

PRIVACY

AUTHENTICATION

VERIFICATION

Page 2: 2011 5-privacy

LEARNING OUTCOME :

• List way to protect privacy

• State authentication andverification methods /technologies

Page 3: 2011 5-privacy

What is Privacy ?

• in IT refers to data and information privacy

How does computer technology threaten

the privacy of our data?

1. Cookies

are used to identify users by web casting, e-commerce and other web

applications.

2. Electronic profile

combining of data in a database that can be sold to the Internet by the

company to the interested parties.

3. Spyware

refers to a program that collects user information without the user’s

knowledge.

Page 4: 2011 5-privacy

Example of cookies :

Page 5: 2011 5-privacy

Example of internet profile :

Page 6: 2011 5-privacy

Example of spyware:

Page 7: 2011 5-privacy

WHY DO WE NEED PRIVACY?• We need privacy for anonymity.

• We also need privacy for confidentiality.

Page 8: 2011 5-privacy

Privacy can be protected by:(a) Privacy law(b) Utilities software

Page 9: 2011 5-privacy

Ways to protect privacy

1. Look for privacy policies on web sites.

2. Get a separate account for your personal e-mail.

3. Teach your kids that giving out personal information online means giving it to strangers.

4. Clear your memory cache after browsing.

5. Make sure that online forms are secure.

6. Reject unnecessary cookies.

7. Use anonymous remailers.

8. Keep your e-mail private, use encryption.

9. Use anonymizers while browsing.

10. Purchase goods with cash, rather than credit card.

11. Install personal firewall.

12. Fill in only necessary information on warranty and registration form.

Page 10: 2011 5-privacy

AUTHENTICATION• Process where user verifies their identity.

• 2 methods :

1. Callback system

2. Biometric

device

Page 11: 2011 5-privacy

Example of callback system

Page 12: 2011 5-privacy

something you are2

Page 13: 2011 5-privacy
Page 14: 2011 5-privacy
Page 15: 2011 5-privacy
Page 16: 2011 5-privacy
Page 17: 2011 5-privacy
Page 18: 2011 5-privacy
Page 19: 2011 5-privacy
Page 20: 2011 5-privacy
Page 21: 2011 5-privacy
Page 22: 2011 5-privacy
Page 23: 2011 5-privacy

VERIFICATION• Act of proving or disproving the correctness of a system

with respect to a certain formal specification.

• 2 methods are :

1. User

identification

2. Processed

object

Page 24: 2011 5-privacy

Pin number

*********

Password

*********

something you know1

Page 25: 2011 5-privacy

2 something you have

Smart Card

ATM Card

Security Token

Page 26: 2011 5-privacy

Pin number Password

Something you know

Something you have

Page 27: 2011 5-privacy

Static Password

Dynamic Password 342601

Something you have

Something you know

SECURITY TOKEN

A security token is a small handheld device

that dynamically generates and displays a password.

Page 28: 2011 5-privacy

CONCLUSION

• 12 ways to protect privacy.

• 2 commonly authentication methods are :

–Biometric device (something you are – part of user’s body)

• Fingerprint recognition, facial recognition, hand geometry scanning, iris scanning, retinalscanning, voice recognition, signature verification system.

–Callback system

• Used in the bank operation and business transaction.

Page 29: 2011 5-privacy

CONCLUSION

• 2 commonly verification methods are :

–User identification (something you know –have to remember)

•Pin number or password

–Possessed object (something you have – an object)

•Atm card, credit card, key, security tokenand smart card