Page 67 - Plus_V2.2_C8_Flipbook
P. 67

Let’s CatCh uP


                   Name any three ways to keep your computer physically fit.
                   1.  ____________________       2.  ____________________      3.  ____________________




                        PROTECTING YOUR COMPUTER FROM ILLEGAL ACCESS


                 You have studied about how to keep your computer physically fit. It is equally important to prevent
                 damage or misuse of data, software or hardware of a computer and restrict unauthorised access to it.
                 One of the ways to prevent the misuse of data or software is authentication. Authentication is the
                 process of verifying a user’s identity before granting him or her access to a computer system. In
                 private  and  public  computer  networks  (including  the  Internet), authentication  is  commonly  done
                 through the use of login passwords. Knowledge of the password is assumed to guarantee that the

                 user is authentic.
                 Some of the authentication procedures as follows:

                      Password Protection: Protect your computer using password is an important step to make the data
                    of computer safe from unauthorised use. A password is a word or collection of characters used for
                    user authentication to prove the identity or get approval to gain access to the computer. The password
                    should be kept secret from those computer who are not allowed to access your computer.
                      Biometric Authentication: Biometric authentication is a process
                    in which biological characteristics such as finger print, face and
                    retina are used to check the identity of an individual. In this

                    process, a biometric machine is used to capture the biological
                    details of a person and compare these details with the existing
                    details, which are stored in computer. It is an automated
                    method of recognising a person’s identity by using his/her             Biometric Authentication
                    biological characteristics such as:
                 (i)   Face Recognition: Face recognition is the process to identify an individual by using his/her facial
                    features. Biometric machine captures the facial image or video of person's face. This image is
                    transformed into a unique faceprint. The image is transformed using a technique called 'elastic
                    graph matching'. Images are sent to a back-end database for comparison and possible match.
                    Algebraic algorithms are used to make a perfect match. Currently, face recognition technique is
                    most widely used in smartphones.


                                                             Tech Fact

                       Biometrics were used during prehistoric times.
                       Chinese used finger prints in the 14th century for identification.

                       In the 17th century, finger prints were used to seal official documents.




                                                                                      Computer Safety and Security  65
   62   63   64   65   66   67   68   69   70   71   72