Page 90 - Cyber Safety C-8
P. 90
A push notification asking “Is this login attempt genuine?” that can be confirmed with a
simple tap.
These approaches are more secure because no password is available to steal or guess.
Behavioural Authentication: Modern systems can verify identity by observing daily behavioural
patterns, such as:
Typing speed
Swipe style
Walking pattern
The way a phone is held
These subtle patterns act like invisible security checkpoints working in the background.
AI in Security: Artificial Intelligence can detect unusual login attempts by analysing:
Location of the attempt
Device being used
Time and behaviour patterns
AI can block suspicious access before it becomes a threat.
Wearable & IoT Authentication: Future devices such as
smartwatches or AR/VR headsets may automatically unlock
systems when they are near a computer or phone.
88 Computer Science - VIII

