THEORY
Activity 4 Identify three advantages and three disadvantages of encryption.
Authentication techniques
1
2
3
Factor
Example
Something that you know
●
a Personal Identification Number (PIN)
●
username ID
●
a password or phrase
●
a challenge response (you must provide the correct answer to a particular question).
Something that belongs to you
Something unique about you
These items are normally provided by the organisation providing secure access: ●
a personal card with a magnetic stripe or smart card with an embedded chip.
●
a security wrist band
●
a physical or electronic token or key
●
a smart phone
●
personal identification, such as a passport or driving licence.
Real world Many schools have introduced cashless payment systems. Funds can be added to the account at home and students can pay for lunch or other services in school by using something that is unique to them, like a thumbprint or a magnetic stripe card.
Real world It is possible in some airports to fast-track through passport control by registering to use your biometric data. A scanner scans face or eye, verifies that you are who you say you are and allows you to pass through.
This may be biometric data from the following unique features: ●
the face, the unique pattern formed by our common facial features
●
a scan of either the retina or iris part of our eye
●
a recording of the pattern formed by either a thumb or finger print
●
the shape of our hand and the pattern formed by fingers and thumb
●
a recording and analysis of an individuals voice print
Other sources such as your own DNA can be used but such a test would be time comsuming and expensive.
Review and revise You should now be able to: explain why it is important to keep data secure and confidential ● describe the processes and practices that businesses employ to ensure that data is held securely and confidentially ● give examples of data security in finance, schools, banking and in the retail industry.
171
●
Session 4.7 Keeping computer network data confidential and secure
Having user IDs in combination with passwords is an example of an authentication technique. Authentication techniques are used to identify users to a computer-based system or network. Each technique provides a range of methods for proving your identity, and the higher the security requirement; the more techniques may be used. There are three factors that can be used in authentication:
284950 IGCSE ICT SB_P146_199.indd 171
25/11/20 5:45 PM