Professional Documents
Culture Documents
Information and Communication Technology: Learning Area 1
Information and Communication Technology: Learning Area 1
INFORMATION AND
COMMUNICATION TECHNOLOGY
PRIVACY
AUTHENTICATION
VERIFICATION
LEARNING OUTCOME :
• List way to protect privacy
2. Electronic profile
combining of data in a database that can be sold to the Internet by the
company to the interested parties.
3. Spyware
refers to a program that collects user information without the user’s
knowledge.
Example of cookies :
Example of internet profile :
Example of spyware:
WHY DO WE NEED PRIVACY?
• We need privacy for anonymity.
• We also need privacy for confidentiality.
Privacy can be protected by:
(a) Privacy law
(b) Utilities software
Ways to protect privacy
1. Look for privacy policies on web sites.
2. Get a separate account for your personal e-mail.
3. Teach your kids that giving out personal information online means
giving it to strangers.
4. Clear your memory cache after browsing.
5. Make sure that online forms are secure.
6. Reject unnecessary cookies.
7. Use anonymous remailers.
8. Keep your e-mail private, use encryption.
9. Use anonymizers while browsing.
10. Purchase goods with cash, rather than credit card.
11. Install personal firewall.
12. Fill in only necessary information on warranty and registration form.
AUTHENTICATION
• Process where user verifies their identity.
• 2 methods :
1. 2.
Callback Biometric
system device
Example of callback system
2 something you are
VERIFICATION
• Act of proving or disproving the correctness of a system with
respect to a certain formal specification.
• 2 methods are :
1. 2.
User Processed
identification
object
1 something you know
********* *********
2 something you have
ATM Card
Smart Card
Card
r edit Security Token
C
Something you know