LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.

Slides:



Advertisements
Similar presentations
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
Advertisements

Lecture 6 User Authentication (cont)
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Crime and Security in the Networked Economy Part 4.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Marjie Rodrigues
Security-Authentication
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Chapter 10: Authentication Guide to Computer Network Security.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
CSE 4482, Fall 2009, D Chan Session 2 – Common Security Techniques.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Internet Security for Small & Medium Business Week 6
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Management 345 Topic Project Topic: Biometrics. Group Members Jason Lang Jason Lang Kasey Minor Kasey Minor Christopher Doub Christopher Doub Eric Pulley.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
Biometrics Authentication Technology
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Computerization of a bank  Automatic Teller Machines  Net Banking  Phone Banking  Savings/ Current/ Fixed Deposit/ Recurring Deposit  Loans against.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Biometric Technologies
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Access Control / Authenticity Michael Sheppard 11/10/10.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Networking Network Classification, by there: 3 Security And Communications software.
INFORMATION AND COMMUNICATION TECHNOLOGY AND SOCIETY
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
My topic is…………. - It is the fundamental building block and the primary lines of defense in computer security. - It is a basic for access control and.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Identity and Access Management
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Biometric technology.
COEN 351 Authentication.
Presentation transcript:

LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION

LEARNING OUTCOME : List way to protect privacy State authentication and verification methods / technologies

What is Privacy ? in IT refers to data and information privacy How does computer technology threaten the privacy of our data? 1. Cookies are used to identify users by web casting, e-commerce and other web applications. 2. Electronic profile combining of data in a database that can be sold to the Internet by the company to the interested parties. 3. Spyware refers to a program that collects user information without the user’s knowledge.

Example of cookies :

Example of internet profile :

Example of spyware:

WHY DO WE NEED PRIVACY? We need privacy for anonymity. We also need privacy for confidentiality.

Privacy can be protected by: (a) Privacy law (b) Utilities software

Ways to protect privacy 1.Look for privacy policies on web sites. 2.Get a separate account for your personal . 3.Teach your kids that giving out personal information online means giving it to strangers. 4.Clear your memory cache after browsing. 5.Make sure that online forms are secure. 6.Reject unnecessary cookies. 7.Use anonymous r ers. 8.Keep your private, use encryption. 9.Use anonymizers while browsing. 10.Purchase goods with cash, rather than credit card. 11.Install personal firewall. 12.Fill in only necessary information on warranty and registration form.

AUTHENTICATION Process where user verifies their identity. 2 methods : 1. Callback system 2. Biometric device

Example of callback system

something you are 2

VERIFICATION Act of proving or disproving the correctness of a system with respect to a certain formal specification. 2 methods are : 1. User identification 2. Processed object

Pin number ********* Password ********* something you know 1

2 something you have Smart Card ATM Card Credit Card Security Token

Pin number Password Something you know Something you have

Static Password Dynamic Password Something you have Something you know SECURITY TOKEN A security token is a small handheld device that dynamically generates and displays a password.

CONCLUSION 12 ways to protect privacy. 2 commonly authentication methods are : – Biometric device (something you are – part of user’s body) Fingerprint recognition, facial recognition, hand geometry scanning, iris scanning, retinal scanning, voice recognition, signature verification system. – Callback system Used in the bank operation and business transaction.

CONCLUSION 2 commonly verification methods are : – User identification (something you know – have to remember) Pin number or password – Possessed object (something you have – an object) Atm card, credit card, key, security token and smart card