Methods of identification
10.1.3.3 argue the use of methods for protection of access to data (authorization, biometric authentification)
Do you know?
What is authentication?
What are the methods of authentication (identification)?
How does identification helps us in our everyday life?
Authentication
Checking authenticity of user’s identifier.
Identifier: key, that is needed to identify user.
Identification
Today there are 3 types of identification of user:
password or personal identification number (user “knows”);
some item that the user has;
any physiological signs peculiar to specific individuals (user “is”).
Using
Each password that we use every day is a specific identifier: a password for accessing a smartphone, a password for a social network, a password for accessing a bank card, and so on.
Security
With the development of technology, the demand for increased protection of certain data has increased. If earlier a simple password was enough, now, when it can be hacked, new ways of protecting information have appeared, based on the biometric characteristics of the owner.
Group work
Divide into 3 groups by the identification method
Draw a poster on chosen identification method
Prepare the way of presenting
Choose speaker from each group
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.