Page 90 - Cyber Safety C-8
P. 90

A push notification asking “Is this login attempt genuine?” that can be confirmed with a
                         simple tap.




















                  These approaches are more secure because no password is available to steal or guess.

                      Behavioural Authentication: Modern systems can verify identity by observing daily behavioural
                     patterns, such as:
                           Typing speed

                           Swipe style

                           Walking pattern
                           The way a phone is held

                  These subtle patterns act like invisible security checkpoints working in the background.






















                      AI in Security: Artificial Intelligence can detect unusual login attempts by analysing:

                          Location of the attempt

                          Device being used
                          Time and behaviour patterns

                     AI can block suspicious access before it becomes a threat.

                      Wearable  & IoT  Authentication: Future devices  such as
                     smartwatches  or AR/VR  headsets  may  automatically  unlock
                     systems when they are near a computer or phone.


                   88   Computer Science - VIII
   85   86   87   88   89   90   91   92   93   94   95