<http://lib.cnfolio.com/AuthenticationTechTutorial02>
Authentication Methods and Protocols

Concepts of identity and privacy




READING BEFORE TUTORIAL



TUTORIAL QUESTIONS
  1. What are the primary elements in an authentication transaction?
  2. What are the key data privacy issues from these different perspectives?
    • Technical
    • Social
    • Personal
  3. Is usability a design requirement or comparative criterion of authentication systems?
  4. What kind of information were the writers trying to protect during the Renaissance?
  5. Which techniques did those writers use?
  6. For those writers, what is the difference between knowledge, identity and spirituality?
  7. For those writers, was secrecy valued more than openness? Which do you value more?
  8. What is the difference between intentional vs. inadvertent eavesdropping?
  9. How does the structure or architecture of a building affect eavesdropping?
  10. How is eavesdropping dependent on the flow of information?
  11. What is the most effective way to protect yourself from eavesdroppers?
  12. What are the risks for people who receive information by eavesdropping?
  13. How much of data security could be described as a form of eavesdropping?




TUTORIAL NOTES

Authentication participants


Authentication definition


Types of authentication


Concept of privacy


Some privacy issues


Usability design is authentication


Architecture is a form of authentication


Authentication in Anglesea building depends on functional purpose


Intellectual property could be a form of identity or a form of knowledge


Eavesdropping affects data in transit