Page 70 - TP_Plus_v2.2_Class_8
P. 70
Let’s CatCh uP
Name three ways to keep your computer in good physical condition.
1. ____________________ 2. ____________________ 3. ____________________
PROTECTING YOUR COMPUTER FROM ILLEGAL ACCESS
You have learnt how to keep your computer physically fit. It is equally important to prevent the damage
or misuse of data, software or hardware and to restrict unauthorised access to your computer.
One of the ways to prevent the misuse of data or software is through authentication. Authentication
is the process of verifying a user’s identity before granting access to a computer system. In private
and public computer networks (including the Internet), authentication is typically done through the
use of login passwords. Knowledge of the password is assumed to confirm that the user is authentic.
Some of the authentication procedures as follows:
Password Protection: Protecting your computer with a password is an important step to keep the
data of computer safe from unauthorised use. A password is a word or collection of characters used
for user authentication to verify identity or gain approval to access the computer. The password
should be kept secret from individuals who are not authorised to access your computer.
Biometric Authentication: Biometric authentication is a process in which biological
characteristics such as finger print, face and retina are used to
verify the identity of an individual. In this process, a biometric
device is used to capture the biological details of a person
and compares with the existing data stored in computer. It is
an automated method of recognising a person’s identity by
using their biological characteristics. Some type of biometric Biometric Authentication
authentication are as follows:
(i) Face Recognition: Face recognition is the process of identifying an individual their facial features.
A biometric device captures an image or video of the person’s face. This image is transformed
into a unique faceprint using a technique called 'elastic graph matching'. The faceprint is then
sent to a back-end database for comparison and possible matching. Algebraic algorithms are
used to achieve an accurate match. Currently, face recognition technique is most widely used
in smartphones.
Tech Fact
Biometrics have been used during prehistoric times.
The Chinese used fingerprints in the 14th century for identification purposes.
In the 17th century, fingerprints were used to seal official documents.
68 Plus (Ver. 2.2)-VIII

