2011 5-privacy

Post on 09-Jul-2015

39 views 0 download

Tags:

Transcript of 2011 5-privacy

LEARNING AREA 1 : INFORMATION AND

COMMUNICATION TECHNOLOGY

PRIVACY

AUTHENTICATION

VERIFICATION

LEARNING OUTCOME :

• List way to protect privacy

• State authentication andverification methods /technologies

What is Privacy ?

• in IT refers to data and information privacy

How does computer technology threaten

the privacy of our data?

1. Cookies

are used to identify users by web casting, e-commerce and other web

applications.

2. Electronic profile

combining of data in a database that can be sold to the Internet by the

company to the interested parties.

3. Spyware

refers to a program that collects user information without the user’s

knowledge.

Example of cookies :

Example of internet profile :

Example of spyware:

WHY DO WE NEED PRIVACY?• We need privacy for anonymity.

• We also need privacy for confidentiality.

Privacy can be protected by:(a) Privacy law(b) Utilities software

Ways to protect privacy

1. Look for privacy policies on web sites.

2. Get a separate account for your personal e-mail.

3. Teach your kids that giving out personal information online means giving it to strangers.

4. Clear your memory cache after browsing.

5. Make sure that online forms are secure.

6. Reject unnecessary cookies.

7. Use anonymous remailers.

8. Keep your e-mail private, use encryption.

9. Use anonymizers while browsing.

10. Purchase goods with cash, rather than credit card.

11. Install personal firewall.

12. Fill in only necessary information on warranty and registration form.

AUTHENTICATION• Process where user verifies their identity.

• 2 methods :

1. Callback system

2. Biometric

device

Example of callback system

something you are2

VERIFICATION• Act of proving or disproving the correctness of a system

with respect to a certain formal specification.

• 2 methods are :

1. User

identification

2. Processed

object

Pin number

*********

Password

*********

something you know1

2 something you have

Smart Card

ATM Card

Security Token

Pin number Password

Something you know

Something you have

Static Password

Dynamic Password 342601

Something you have

Something you know

SECURITY TOKEN

A security token is a small handheld device

that dynamically generates and displays a password.

CONCLUSION

• 12 ways to protect privacy.

• 2 commonly authentication methods are :

–Biometric device (something you are – part of user’s body)

• Fingerprint recognition, facial recognition, hand geometry scanning, iris scanning, retinalscanning, voice recognition, signature verification system.

–Callback system

• Used in the bank operation and business transaction.

CONCLUSION

• 2 commonly verification methods are :

–User identification (something you know –have to remember)

•Pin number or password

–Possessed object (something you have – an object)

•Atm card, credit card, key, security tokenand smart card