Methods of identification
10.6.2.3 describe user data protection measures: passwords, accounts, authentication, biometric authentication
Methods of identification
10.6.2.3 describe user data protection measures: passwords, accounts, authentication, biometric authentication
Do you know?
What is authentication?
What are the methods of authentication (identification)?
How does identification helps us in our everyday life?
Do you know?
What is authentication?
What are the methods of authentication (identification)?
How does identification helps us in our everyday life?
Authentication
Checking authenticity of user’s identifier.
Identifier: key, that is needed to identify user.
Authentication
Checking authenticity of user’s identifier.
Identifier: key, that is needed to identify user.
Identification
Today there are 3 types of identification of user:
password or personal identification number (user “knows”);
some item that the user has;
any physiological signs peculiar to specific individuals (user “is”).
Identification
Today there are 3 types of identification of user:
password or personal identification number (user “knows”);
some item that the user has;
any physiological signs peculiar to specific individuals (user “is”).
Using
Each password that we use every day is a specific identifier: a password for accessing a smartphone, a password for a social network, a password for accessing a bank card, and so on.
Using
Each password that we use every day is a specific identifier: a password for accessing a smartphone, a password for a social network, a password for accessing a bank card, and so on.
Security
With the development of technology, the demand for increased protection of certain data has increased. If earlier a simple password was enough, now, when it can be hacked, new ways of protecting information have appeared, based on the biometric characteristics of the owner.
Security
With the development of technology, the demand for increased protection of certain data has increased. If earlier a simple password was enough, now, when it can be hacked, new ways of protecting information have appeared, based on the biometric characteristics of the owner.
Group work
Divide into 3 groups by the identification method
Draw a poster on chosen identification method
Prepare the way of presenting
Choose speaker from each group
Group work
Divide into 3 groups by the identification method
Draw a poster on chosen identification method
Prepare the way of presenting
Choose speaker from each group
Reflection
What did you learn in class?
What was the most interesting?
What was left incomprehensible?
Was this lesson helpful to you?
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.