My Next ICT Flyer

PIN Numbers, Legislations, Encryption, Biometric Scanners

PIN NUMBERS

A PIN number is a personal identification number. They are commonly given to bank customers for use with automatic cash dispensers. They are also used, sometimes with a security number for individual access to computer networks or other secure systems. It is usually a four or six digit number.

LEGISLATION

Legislation is a law which has been produced by a governing body in order to regulate, to authorise, to grant, to declare or to restrict. Legislation is the governing legal principles outlining the responsibilities of event organisers, and other stakeholders such as the local authority, to protect the safety of the public.
Big image

ENCRYPTION

Encryption is used to protect data in transit sent from different devices in all sorts of networks, not just the Internet. Every time someone uses an ATM or buys something online On a device, makes a phone call or presses a key to unlock a phone or car, encryption is used to protect the information from unauthorised people reading or stealing it. Digital rights management systems, prevent unauthorized use or of making copies of the encrypted material. It's basically the sophisticated way to tell a secret. But this also has some major problems. Some are; that it is slower because, the server/the computer takes time to decode the data and sometimes it's difficult. Online servers have a digital certificate that has access to a part of the key. This is not always free and has to be done by someone certified. Encryption uses advances mathematics which is not easy for the system to crack. Sometimes decipherers or professionals tend to crack these codes and data is stolen. A famous example of encryption is the Enigma cipher which was coded by the Germans during WW1 and was eventually hacked by a British solider, decipherer called Alan Turing.

BIOMETRIC SCANNERS

Biometrics are automated methods of recognizing a person based on a Behavioural characteristics. Biometrics are available for face, fingerprints, handwriting, iris, retinal, vein, and voice. Biometric data are separate and distinct from personal information. Biometric templates cannot be reversed to recreate personal information and they cannot be stolen and used to access personal information.
Using a unique, physical attribute of your body, such as your fingerprint or your eye to identify and verify that you are who you say you are, is the best and easiest solution in the world.

FORENSIC COMPUTING

Computer forensics is the analysis of information contained within and created with computer systems and devices, in the interest of figuring out what happened, when it happened, how it happened, and who was involved.this is very useful to figure out crimes and about figuring out who misused the computing devices. Computer forensic techniques are commonly used for conducting computing investigations. In the interest of figuring out what happened, when it happened, how it happened, and who was involved. It is the practice of collecting, analysing and reporting on digital crime and misuse of the computing devices. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally.

Big image