Biometrics:
It works by using features that are unique to the human body. They usually use a fingerprint and when the scanner recognises your finger print you are granted access.
3 other examples:
Vein scanners
Retinal Scanners
Facial Recognition
Two advantages are:
You don't have to remeber any passwords
The system is hard to abuse.
Two disadvantgaes are:
Some people worry about the privacy
The readers are quite expensive.
A digital signature is a way of ensuring that an email or document sent electronically is authentic. it can be used to detect a forged document.
Digital signitures are used to check authenticity of the person typing using the software
Viruses
It works by using features that are unique to the human body. They usually use a fingerprint and when the scanner recognises your finger print you are granted access.
3 other examples:
Vein scanners
Retinal Scanners
Facial Recognition
Two advantages are:
You don't have to remeber any passwords
The system is hard to abuse.
Two disadvantgaes are:
Some people worry about the privacy
The readers are quite expensive.
A digital signature is a way of ensuring that an email or document sent electronically is authentic. it can be used to detect a forged document.
Digital signitures are used to check authenticity of the person typing using the software
Viruses
•A piece of programming code/software which copies itself from one computer to another.
•It does this by attaching itself to files and is transferred via email, programs/files/images downloaded from the Internet or portable media – USBs etc.
•It can:
–Corrupt and/or delete files and data.
–Corrupt and/or delete the contents of a hard disk.
–Make software unusable.
To prevent install an antivirus software, update the software reguarly.
Encryption
•It does this by attaching itself to files and is transferred via email, programs/files/images downloaded from the Internet or portable media – USBs etc.
•It can:
–Corrupt and/or delete files and data.
–Corrupt and/or delete the contents of a hard disk.
–Make software unusable.
To prevent install an antivirus software, update the software reguarly.
Encryption
•This is used to stop data getting into the wrong hands as it travels over the Internet.
•Encryption works by scrambling data as it’s transferred from one place to another.
•This results in data which is not understandable/readable.
•It requires an encryption key/software to encrypt and decryption key to decrypt and read it.
Used for the following:
Sending credit card details.
Online banking.
Sending payment details.
Confidential emails.
Storing sensitive personal information.
•Encryption works by scrambling data as it’s transferred from one place to another.
•This results in data which is not understandable/readable.
•It requires an encryption key/software to encrypt and decryption key to decrypt and read it.
Used for the following:
Sending credit card details.
Online banking.
Sending payment details.
Confidential emails.
Storing sensitive personal information.
•Hacking
–Gaining unauthorised access to a computer system.
–Gaining authorised access to a system but accessing areas without permission.
–May lead to illegally copying/deleting/changing data from a system.
•Protect against hackers accessing your personal data:
–A hacker could simply intercept and read your email.
–A hacker could alter or collect personal details including credit card numbers which could be used to commit fraud.
•Drawbacks
–Data can still be deleted from the system.
–Criminals can use encryption to keep incriminating material secure.
Data Protection Act:
1. The purpose of the data protection act is it sets out rules for people who use or store data about people, it gives rights to these people.
2. The latest version of the data protection act was released in 1998.
3.The main points about the act:
If you collect data about people for one reason, you must not use it for a different reason;
You must not give people's data to other people or organisations unless they agree;
People have the right to look at data that any organisations store about them;
You must not keep the data for longer than you need to and it must be kept up to date;
Organizations that store data about people must register with the Information Commissioner’s Office;
If you store data about people you must make sure that it is secure and well protected;
If an organization has data about you that is wrong, then you have a right to ask them to change it.
–Gaining unauthorised access to a computer system.
–Gaining authorised access to a system but accessing areas without permission.
–May lead to illegally copying/deleting/changing data from a system.
•Protect against hackers accessing your personal data:
–A hacker could simply intercept and read your email.
–A hacker could alter or collect personal details including credit card numbers which could be used to commit fraud.
•Drawbacks
–Data can still be deleted from the system.
–Criminals can use encryption to keep incriminating material secure.
Data Protection Act:
1. The purpose of the data protection act is it sets out rules for people who use or store data about people, it gives rights to these people.
2. The latest version of the data protection act was released in 1998.
3.The main points about the act:
If you collect data about people for one reason, you must not use it for a different reason;
You must not give people's data to other people or organisations unless they agree;
People have the right to look at data that any organisations store about them;
You must not keep the data for longer than you need to and it must be kept up to date;
Organizations that store data about people must register with the Information Commissioner’s Office;
If you store data about people you must make sure that it is secure and well protected;
If an organization has data about you that is wrong, then you have a right to ask them to change it.