2011 5-privacy
-
Upload
cikgushaharizan -
Category
Technology
-
view
39 -
download
0
Transcript of 2011 5-privacy
![Page 1: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/1.jpg)
LEARNING AREA 1 : INFORMATION AND
COMMUNICATION TECHNOLOGY
PRIVACY
AUTHENTICATION
VERIFICATION
![Page 2: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/2.jpg)
LEARNING OUTCOME :
• List way to protect privacy
• State authentication andverification methods /technologies
![Page 3: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/3.jpg)
What is Privacy ?
• in IT refers to data and information privacy
How does computer technology threaten
the privacy of our data?
1. Cookies
are used to identify users by web casting, e-commerce and other web
applications.
2. Electronic profile
combining of data in a database that can be sold to the Internet by the
company to the interested parties.
3. Spyware
refers to a program that collects user information without the user’s
knowledge.
![Page 4: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/4.jpg)
Example of cookies :
![Page 5: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/5.jpg)
Example of internet profile :
![Page 6: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/6.jpg)
Example of spyware:
![Page 7: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/7.jpg)
WHY DO WE NEED PRIVACY?• We need privacy for anonymity.
• We also need privacy for confidentiality.
![Page 8: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/8.jpg)
Privacy can be protected by:(a) Privacy law(b) Utilities software
![Page 9: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/9.jpg)
Ways to protect privacy
1. Look for privacy policies on web sites.
2. Get a separate account for your personal e-mail.
3. Teach your kids that giving out personal information online means giving it to strangers.
4. Clear your memory cache after browsing.
5. Make sure that online forms are secure.
6. Reject unnecessary cookies.
7. Use anonymous remailers.
8. Keep your e-mail private, use encryption.
9. Use anonymizers while browsing.
10. Purchase goods with cash, rather than credit card.
11. Install personal firewall.
12. Fill in only necessary information on warranty and registration form.
![Page 10: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/10.jpg)
AUTHENTICATION• Process where user verifies their identity.
• 2 methods :
1. Callback system
2. Biometric
device
![Page 11: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/11.jpg)
Example of callback system
![Page 12: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/12.jpg)
something you are2
![Page 13: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/13.jpg)
![Page 14: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/14.jpg)
![Page 15: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/15.jpg)
![Page 16: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/16.jpg)
![Page 17: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/17.jpg)
![Page 18: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/18.jpg)
![Page 19: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/19.jpg)
![Page 20: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/20.jpg)
![Page 21: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/21.jpg)
![Page 22: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/22.jpg)
![Page 23: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/23.jpg)
VERIFICATION• Act of proving or disproving the correctness of a system
with respect to a certain formal specification.
• 2 methods are :
1. User
identification
2. Processed
object
![Page 24: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/24.jpg)
Pin number
*********
Password
*********
something you know1
![Page 25: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/25.jpg)
2 something you have
Smart Card
ATM Card
Security Token
![Page 26: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/26.jpg)
Pin number Password
Something you know
Something you have
![Page 27: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/27.jpg)
Static Password
Dynamic Password 342601
Something you have
Something you know
SECURITY TOKEN
A security token is a small handheld device
that dynamically generates and displays a password.
![Page 28: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/28.jpg)
CONCLUSION
• 12 ways to protect privacy.
• 2 commonly authentication methods are :
–Biometric device (something you are – part of user’s body)
• Fingerprint recognition, facial recognition, hand geometry scanning, iris scanning, retinalscanning, voice recognition, signature verification system.
–Callback system
• Used in the bank operation and business transaction.
![Page 29: 2011 5-privacy](https://reader033.fdocuments.net/reader033/viewer/2022060203/559e9dd31a28abcd048b46d8/html5/thumbnails/29.jpg)
CONCLUSION
• 2 commonly verification methods are :
–User identification (something you know –have to remember)
•Pin number or password
–Possessed object (something you have – an object)
•Atm card, credit card, key, security tokenand smart card