2_2_Methods_of_identification_presentation_lesson_2_variant_2

  • pptx
  • 02.05.2020
Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала 2_2_Methods_of_identification_presentation_lesson_2_variant_2.pptx

Methods of identification

10.1.3.3 argue the use of methods for protection of access to data (authorization, biometric authentification)

Do you know?

What is authentication?
What are the methods of authentication (identification)?
How does identification helps us in our everyday life?

Authentication

Checking authenticity of user’s identifier.

Identifier: key, that is needed to identify user.

Identification

Today there are 3 types of identification of user:

password or personal identification number (user “knows”);
some item that the user has;
any physiological signs peculiar to specific individuals (user “is”).

Using

Each password that we use every day is a specific identifier: a password for accessing a smartphone, a password for a social network, a password for accessing a bank card, and so on.

Security

With the development of technology, the demand for increased protection of certain data has increased. If earlier a simple password was enough, now, when it can be hacked, new ways of protecting information have appeared, based on the biometric characteristics of the owner.

Most popular types of biometrical identification:

fingerprint

eye vascular pattern

By face

Group work

Divide into 3 groups by the identification method
Draw a poster on chosen identification method
Prepare the way of presenting
Choose speaker from each group

Reflection

What did you learn in class?
What was the most interesting?
What was left incomprehensible?
Was this lesson helpful to you?

Посмотрите также