Page 70 - TP_Plus_v2.2_Class_8
P. 70

Let’s CatCh uP


                    Name three ways to keep your computer in good physical condition.
                    1.  ____________________       2.  ____________________      3.  ____________________




                         PROTECTING YOUR COMPUTER FROM ILLEGAL ACCESS


                  You have learnt how to keep your computer physically fit. It is equally important to prevent the damage
                  or misuse of data, software or hardware and to restrict unauthorised access to your computer.
                  One of the ways to prevent the misuse of data or software is through authentication. Authentication
                  is the process of verifying a user’s identity before granting access to a computer system. In private
                  and public computer networks (including the Internet), authentication is typically done through the
                  use of login passwords. Knowledge of the password is assumed to confirm that the user is authentic.

                  Some of the authentication procedures as follows:
                       Password Protection: Protecting your computer with a password is an important step to keep the

                     data of computer safe from unauthorised use. A password is a word or collection of characters used
                     for user authentication to verify identity or gain approval to access the computer. The password
                     should be kept secret from individuals who are not authorised to access your computer.
                       Biometric Authentication: Biometric authentication is a  process in  which  biological
                     characteristics such as finger print, face and retina are used to
                     verify the identity of an individual. In this process, a biometric
                     device is used to capture the biological details of a person

                     and compares with the existing data stored in computer. It is
                     an automated method of recognising a person’s identity by
                     using their biological characteristics. Some type of biometric         Biometric Authentication
                     authentication are as follows:
                        (i)   Face Recognition: Face recognition is the process of identifying an individual their facial features.
                         A biometric device captures an image or video of the person’s face. This image is transformed
                         into a unique faceprint using a technique called 'elastic graph matching'. The faceprint is then
                         sent to a back-end database for comparison and possible matching. Algebraic algorithms are
                         used to achieve an accurate match. Currently, face recognition technique is most widely used
                         in smartphones.


                                                              Tech Fact

                        Biometrics have been used during prehistoric times.
                        The Chinese used fingerprints in the 14th century for identification purposes.

                        In the 17th century, fingerprints were used to seal official documents.





                  68    Plus (Ver. 2.2)-VIII
   65   66   67   68   69   70   71   72   73   74   75