2_Identification Methods__presentation_lesson_2_variant

  • pptx
  • 02.05.2020
Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала 2_Identification Methods__presentation_lesson_2_variant.pptx

Methods of identification

10.6.2.3 describe user data protection measures: passwords, accounts, authentication, biometric authentication

Methods of identification

10.6.2.3 describe user data protection measures: passwords, accounts, authentication, biometric authentication

Do you know?

What is authentication?
What are the methods of authentication (identification)?
How does identification helps us in our everyday life?

Do you know?

What is authentication?
What are the methods of authentication (identification)?
How does identification helps us in our everyday life?

Authentication

Checking authenticity of user’s identifier.

Identifier: key, that is needed to identify user.

Authentication

Checking authenticity of user’s identifier.

Identifier: key, that is needed to identify user.

Identification

Today there are 3 types of identification of user:

password or personal identification number (user “knows”);
some item that the user has;
any physiological signs peculiar to specific individuals (user “is”).

Identification

Today there are 3 types of identification of user:

password or personal identification number (user “knows”);
some item that the user has;
any physiological signs peculiar to specific individuals (user “is”).

Using

Each password that we use every day is a specific identifier: a password for accessing a smartphone, a password for a social network, a password for accessing a bank card, and so on.

Using

Each password that we use every day is a specific identifier: a password for accessing a smartphone, a password for a social network, a password for accessing a bank card, and so on.

Security

With the development of technology, the demand for increased protection of certain data has increased. If earlier a simple password was enough, now, when it can be hacked, new ways of protecting information have appeared, based on the biometric characteristics of the owner.

Security

With the development of technology, the demand for increased protection of certain data has increased. If earlier a simple password was enough, now, when it can be hacked, new ways of protecting information have appeared, based on the biometric characteristics of the owner.

Most popular types of biometrical identification:

fingerprint

eye vascular pattern

By face

Most popular types of biometrical identification:

fingerprint

eye vascular pattern

By face

Group work

Divide into 3 groups by the identification method
Draw a poster on chosen identification method
Prepare the way of presenting
Choose speaker from each group

Group work

Divide into 3 groups by the identification method
Draw a poster on chosen identification method
Prepare the way of presenting
Choose speaker from each group

Reflection

What did you learn in class?
What was the most interesting?
What was left incomprehensible?
Was this lesson helpful to you?

Reflection

What did you learn in class?
What was the most interesting?
What was left incomprehensible?
Was this lesson helpful to you?

Посмотрите также