2_Identification Methods_presentation variant_1
Оценка 4.8

2_Identification Methods_presentation variant_1

Оценка 4.8
pptx
02.05.2020
2_Identification Methods_presentation variant_1
2_Identification Methods_presentation variant_1.pptx

How does it called when we: - enter a website with login and password; - unlock our smartphone; - use a digital signature on the…

How does it called when we: - enter a website with login and password; - unlock our smartphone; - use a digital signature on the…

How does it called when we:
- enter a website with login and password;
- unlock our smartphone;
- use a digital signature on the egov.kz website?

Methods of identification 10.6

Methods of identification 10.6

Methods of identification

10.6.2.3 describe user data protection measures: passwords, accounts, authentication, biometric authentication

Identification Identification describes a method of ensuring that a subject is the entity it claims to be

Identification Identification describes a method of ensuring that a subject is the entity it claims to be

Identification

Identification describes a method of ensuring that a subject is the entity it claims to be

In pairs Divide in pairs and write down different identification methods you know

In pairs Divide in pairs and write down different identification methods you know

In pairs

Divide in pairs and write down different identification methods you know

Methods of identification Biometrics

Methods of identification Biometrics

Methods of identification

Biometrics
Passwords
Cognitive Passwords
One-Time or Dynamic Passwords
Cryptographic Keys
Smart Cards
Digital sign

Biometrics Verifies an individuals identity by analyzing a unique personal attribute or behavior

Biometrics Verifies an individuals identity by analyzing a unique personal attribute or behavior

Biometrics

Verifies an individuals identity by analyzing a unique personal attribute or behavior
It is the most effective and accurate method for verifying identification.
It is the most expensive authentication mechanism
Types of Biometric Systems
Finger Print- are based on the ridge endings, bifurcation exhibited by the friction edges and some minutiae of the finger
Retina Scan- is based on the blood vessel pattern of the retina on the backside of the eyeball.

https://www.youtube.com/watch?v=4BIUZR_Hh30

https://www.youtube.com/watch?v=4BIUZR_Hh30

https://www.youtube.com/watch?v=4BIUZR_Hh30

Reflection At the end of the lesson, learners reflect on their learning:

Reflection At the end of the lesson, learners reflect on their learning:

Reflection

At the end of the lesson, learners reflect on their learning:
What has been learned
What remained unclear
What needs more attention
Reflection Thermometer:

36,60С interesting, useful
380С is not interesting, hard
340С useless, priceless

Материалы на данной страницы взяты из открытых истончиков либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.
02.05.2020