Skip to main content

Collins Cambridge IGCSE™ - Cambridge IGCSE™ ICT Student's Book

Page 26

THEORY

Activity 4 Identify three advantages and three disadvantages of encryption.

Authentication techniques

1

2

3

Factor

Example

Something that you know

a Personal Identification Number (PIN)

username ID

a password or phrase

a challenge response (you must provide the correct answer to a particular question).

Something that belongs to you

Something unique about you

These items are normally provided by the organisation providing secure access: ●

a personal card with a magnetic stripe or smart card with an embedded chip.

a security wrist band

a physical or electronic token or key

a smart phone

personal identification, such as a passport or driving licence.

Real world Many schools have introduced cashless payment systems. Funds can be added to the account at home and students can pay for lunch or other services in school by using something that is unique to them, like a thumbprint or a magnetic stripe card.

Real world It is possible in some airports to fast-track through passport control by registering to use your biometric data. A scanner scans face or eye, verifies that you are who you say you are and allows you to pass through.

This may be biometric data from the following unique features: ●

the face, the unique pattern formed by our common facial features

a scan of either the retina or iris part of our eye

a recording of the pattern formed by either a thumb or finger print

the shape of our hand and the pattern formed by fingers and thumb

a recording and analysis of an individuals voice print

Other sources such as your own DNA can be used but such a test would be time comsuming and expensive.

Review and revise You should now be able to: explain why it is important to keep data secure and confidential ● describe the processes and practices that businesses employ to ensure that data is held securely and confidentially ● give examples of data security in finance, schools, banking and in the retail industry.

171

Session 4.7 Keeping computer network data confidential and secure

Having user IDs in combination with passwords is an example of an authentication technique. Authentication techniques are used to identify users to a computer-based system or network. Each technique provides a range of methods for proving your identity, and the higher the security requirement; the more techniques may be used. There are three factors that can be used in authentication:

284950 IGCSE ICT SB_P146_199.indd 171

25/11/20 5:45 PM


Turn static files into dynamic content formats.

Create a flipbook
Collins Cambridge IGCSE™ - Cambridge IGCSE™ ICT Student's Book by Collins - Issuu