2_Identification Methods_presentation variant_1

  • pptx
  • 02.05.2020
Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала 2_Identification Methods_presentation variant_1.pptx

How does it called when we:
- enter a website with login and password;
- unlock our smartphone;
- use a digital signature on the egov.kz website?

Methods of identification

10.6.2.3 describe user data protection measures: passwords, accounts, authentication, biometric authentication

Identification

Identification describes a method of ensuring that a subject is the entity it claims to be

In pairs

Divide in pairs and write down different identification methods you know

Methods of identification

Biometrics
Passwords
Cognitive Passwords
One-Time or Dynamic Passwords
Cryptographic Keys
Smart Cards
Digital sign

Biometrics

Verifies an individuals identity by analyzing a unique personal attribute or behavior
It is the most effective and accurate method for verifying identification.
It is the most expensive authentication mechanism
Types of Biometric Systems
Finger Print- are based on the ridge endings, bifurcation exhibited by the friction edges and some minutiae of the finger
Retina Scan- is based on the blood vessel pattern of the retina on the backside of the eyeball.

https://www.youtube.com/watch?v=4BIUZR_Hh30

Reflection

At the end of the lesson, learners reflect on their learning:
What has been learned
What remained unclear
What needs more attention
Reflection Thermometer:

36,60С interesting, useful
380С is not interesting, hard
340С useless, priceless