Published by Patrick Mutisya · 14 days ago
Know and understand the characteristics and methods of protecting data, including biometrics, digital certificates, Secure Socket Layer (SSL), encryption, firewalls, two‑factor authentication, and user ID/password.
| Method | How it works | Advantages | Limitations |
|---|---|---|---|
| Biometrics | Uses unique physical or behavioural characteristics (e.g., fingerprint, iris, voice) to verify identity. | Hard to duplicate; convenient for users. | Requires specialised hardware; may be affected by injuries or changes; privacy concerns. |
| Digital Certificate | Electronically binds a public key to an entity’s identity, issued by a trusted Certificate Authority (CA). | Enables trusted online transactions; supports SSL/TLS. | Relies on CA trustworthiness; certificates expire and must be managed. |
| Secure Socket Layer (SSL) / TLS | Protocol that encrypts data exchanged between a web server and client using asymmetric then symmetric encryption. | Provides confidentiality and integrity for web traffic; visible as “https”. | Requires valid certificates; older versions (SSL 2.0/3.0) are insecure. |
| Encryption | Transforms readable data (plaintext) into unreadable form (ciphertext) using an algorithm and a key. | Protects data at rest and in transit; strong algorithms are mathematically robust. | Key management is critical; weak keys or algorithms can be broken. |
| Firewall | Hardware or software that monitors and controls incoming and outgoing network traffic based on security rules. | Blocks unauthorised access; can be configured for different zones. | Improper rule sets may allow breaches; does not protect against insider threats. |
| Two‑Factor Authentication (2FA) | Requires two independent credentials – something you know (password) and something you have (token, mobile app) or something you are (biometric). | Significantly reduces risk of unauthorised access. | May inconvenience users; token devices can be lost or stolen. |
| User ID & Password | Traditional knowledge‑based authentication; user enters a unique identifier and a secret password. | Simple to implement; familiar to users. | Weak passwords are vulnerable to guessing, phishing, and brute‑force attacks. |
A typical online banking session uses several of the methods described:
| Term | Definition |
|---|---|
| Biometrics | Authentication based on unique physiological or behavioural traits. |
| Digital Certificate | Electronic document that binds a public key to an entity’s identity, issued by a Certificate Authority. |
| SSL / TLS | Protocols that provide encrypted communication over a network, commonly used for HTTPS. |
| Encryption | Process of converting plaintext into ciphertext using an algorithm and a key. |
| Firewall | System that controls network traffic based on predefined security rules. |
| Two‑Factor Authentication (2FA) | Security method requiring two different forms of verification. |
| User ID | Unique identifier assigned to a user for login purposes. |
| Password | Secret string known only to the user, used to prove identity. |