Page 67 - Plus_V2.2_C8_Flipbook
P. 67
Let’s CatCh uP
Name any three ways to keep your computer physically fit.
1. ____________________ 2. ____________________ 3. ____________________
PROTECTING YOUR COMPUTER FROM ILLEGAL ACCESS
You have studied about how to keep your computer physically fit. It is equally important to prevent
damage or misuse of data, software or hardware of a computer and restrict unauthorised access to it.
One of the ways to prevent the misuse of data or software is authentication. Authentication is the
process of verifying a user’s identity before granting him or her access to a computer system. In
private and public computer networks (including the Internet), authentication is commonly done
through the use of login passwords. Knowledge of the password is assumed to guarantee that the
user is authentic.
Some of the authentication procedures as follows:
Password Protection: Protect your computer using password is an important step to make the data
of computer safe from unauthorised use. A password is a word or collection of characters used for
user authentication to prove the identity or get approval to gain access to the computer. The password
should be kept secret from those computer who are not allowed to access your computer.
Biometric Authentication: Biometric authentication is a process
in which biological characteristics such as finger print, face and
retina are used to check the identity of an individual. In this
process, a biometric machine is used to capture the biological
details of a person and compare these details with the existing
details, which are stored in computer. It is an automated
method of recognising a person’s identity by using his/her Biometric Authentication
biological characteristics such as:
(i) Face Recognition: Face recognition is the process to identify an individual by using his/her facial
features. Biometric machine captures the facial image or video of person's face. This image is
transformed into a unique faceprint. The image is transformed using a technique called 'elastic
graph matching'. Images are sent to a back-end database for comparison and possible match.
Algebraic algorithms are used to make a perfect match. Currently, face recognition technique is
most widely used in smartphones.
Tech Fact
Biometrics were used during prehistoric times.
Chinese used finger prints in the 14th century for identification.
In the 17th century, finger prints were used to seal official documents.
Computer Safety and Security 65

