Presentation is loading. Please wait.

Presentation is loading. Please wait.

How It Applies In A Virtual World

Similar presentations


Presentation on theme: "How It Applies In A Virtual World"— Presentation transcript:

1 How It Applies In A Virtual World
Privacy How It Applies In A Virtual World

2 Introduction Got cookies? What is internet Privacy? The Pros and Cons
Internet explorer What is internet Privacy? How secure your computer, files, and information is on the world wide web The Pros and Cons User personalization versus user violation How can it be violated? Through media (google street view), phishing, cookies Taking Precautions

3 Spyware Definition-Malware that can collect information about computer users without their knowledge. It can often hinder a computer’s performance. Many anti-virus programs now have anti-spyware features.

4 How does it occur? People can install them without meaning to as spyware is often installed with other programs. There are two ways of doing this: Piggybacking on a desirable piece of software Trojan horse method i.e tricking the user into downloading it. Can infect through security holes in internet

5 Effects of Spyware Can hinder a computer’s functionality
System becomes slow Can disable firewall and ant-virus programs

6 Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.

7 What is Phishing? When Did it Start?
The term originated in the mid 1990s in connection with AOL Phishing is usually done through fake s or through instant messaging. The user is prompted to provide important information about bank accounts or credit card numbers through s and sites that look legitimate, but are actually fake. Their information can then be used to commit identity theft.

8 Is It Illegal? It is illegal to commit Identity theft.
It is not illegal to ask the user to volunteer their personal information. It is not illegal to send you an important looking message in order to prompt the user into volunteering the desired information. Therefore phishing is only illegal once the information is used to commit identity theft.

9 How Does This Affect The Common User? How can you spot a phishing scam?
Anyone can fall victim to phishing, so every internet user must use caution when volunteering private information. Make sure that your connection is secure. Signs that an or site is not authentic: Misspelled domain names (ex. It has variations of domains as well (ex. Don’t trust an that leads you to a website that only shows an IP address (IP address ex )

10 What are cookies? Cookies are text files stored on one’s computer after visiting a website Used for: -Storing information such as a unique visitor ID -Allowing customization of a webpage, such that it can save information for the computer the person is currently using.

11 Problems with Cookies The information from cookies can be accessed by the website, which can then sell your information to others, allowing for ‘targeted’ ads Based on the ‘profile’ built up by visiting certain websites or by one’s search history, ads will attempt to be tailored to one’s perceived interests

12 Verdict Cookies are, for the most part, harmless Delete your cookies once in a while – some have expiration dates years in the future, and may persist indefinitely In addition, there exist many different pieces of software for those who might want to manage their cookies and maintain their privacy

13

14 What is this? 360 degree views from visual perspectives of the street
Online access to ANYONE!

15 Why it violates one’s privacy?
Gives real pictures of places. Where you live Where you work Schools Public security

16 What can one do? Nothing really…. Sorry
Attempt to sue? (has happened, didn’t work)

17 What does this all mean? There are many ways for people to invade privacy through computers not just limited to spyware, phishing, cookies, and Google street view. In this computer filled world, people continuously find ways to get access to private information. While some of these activities are illegal, not everyone is caught. It is important for people to be aware of strategies used to collect personal information.

18 It is important for people to take precautions so their private information is protected. No one wants their passwords or credit card numbers stolen. Only give sensitive information to authenticated and secure websites. Always validate websites or s. Run anti-virus/anti-spyware programs to ensure that your information is not being collected. Just in case, you can delete cookies. Make sure that your internet connection is secure and install a firewall. Keep up to date on computer news and how to protect yourself.


Download ppt "How It Applies In A Virtual World"

Similar presentations


Ads by Google