<http://lib.cnfolio.com/AuthenticationTechTutorial06>
Authentication Methods and Protocols

Responsibility and protection of individual privacy




READING BEFORE TUTORIAL



TUTORIAL QUESTIONS
  1. How are security and privacy concepts used to write, interpret and enforce legislation that affect individual privacy and security?
    • Individual identity
    • Positive rights
    • Negative rights
    • Ownership
    • Vulnerabilities
    • Countermeasure
    • Threats
    • Mutual authentication
    • Authentication architecture
  2. How do privacy principles and practices improve:
    • Data security
    • Personal security
    • Business profits
    • National security



TUTORIAL NOTES

Legislation that affects privacy


Privacy principles