Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?

Slides:



Advertisements
Similar presentations
The Internet and the Web
Advertisements

Computer networks Fundamentals of Information Technology Session 6.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Computers Going Online Internet Resources and Applications Finding information on the Web browsing: just looking around searching: trying to find specific.
Web-tracking and Adware Hannah Muihrienne Julie Chris.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Virtual Private Network
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Forensic and Investigative Accounting
Privacy Aziz Doumith Michael Kot Luis Pacheco Emory Petermann Wyatt Pierson Henry Stigler.
INLS 200 today’s line-up online privacy short video discussion questions from you? ethics cases? Ulrich’s Guide to Periodicals.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Electronic Use Policies.   Social Media  Internet.
Staying Safe Online Keep your Information Secure.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Deep Packet Inspection Matthew Carson. What is Deep Packet Inspection? A form of packet filtering which examines the data portion of an internet packet.
Computer Ethics.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Computer Tech Class August 20,  Internet was originally started by Department of Defense  Was made as means of communication without central location.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
The Internet TCIP/IP  TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of networking protocols that allows two or more.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
Protecting Students on the School Computer Network Enfield High School.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
1 After completing this lesson, you will be able to: Transfer your files to the Internet. Choose a method for posting your Web pages. Use Microsoft’s My.
E-Detective HTTPS/SSL Interception – MITM & Proxy Decision Group
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
The Legalities of using U.S.(foreign) Servers with Canadian students by Erin Gibbs and Rob Airey.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
The Internet & Web Browsers Business Webpage Design Created by Kelly Seale Adapted by Jill Einerson.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Privacy and Employee Monitoring for the Employee and the Employer Linda Mellon-Hogan August 6, 2009.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
Hotspot Shield Protect Your Online Identity
Backdoor Attacks.
Internet and security.
Privacy or Security Are they the same?
Navigating the Internet
COMPUTER PRIVACY.
How to fix AOL related issue AOL is a type of digital media company that has developed and maintained many online services including service, search.
Internet Basics.
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Health Care: Privacy in a Digital Age
Internet.
Presentation transcript:

Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?

What is Privacy? The ability of an individual or group to seclude themselves or information about themselves and thereby reveal themselves selectively. A personal, subjective condition. One person cannot decide for another what his or her sense of privacy should be.

Online Privacy The ability to control what information one reveals about oneself over the Internet, and to control who can access that information.

How Is My Personal Information Revealed? By ISP: Internet Service Providers Internet Service Providers always know your IP address and the IP address to which you are communicating.

By s May be inappropriately spread by the receiver. May be intercepted. May be legally viewed or disclosed by service providers or authorities. How Is My Personal Information Revealed?

By Social Networking Sites and Discussion Groups Always check your privacy settings to ensure that your private information is not open to the public. How Is My Personal Information Revealed?

Internet Browsers Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries, and passwords. You may accidentally reveal such information when using a browser on a public computer. How Is My Personal Information Revealed?

What are Cookies? Cookies are data packets sent by a server to a web client, and then sent back unchanged by the client each time it accesses that server. They are used for authenticating session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts. They are only data, not programs or viruses.

Cookies can be hijacked and modified by attackers. Cookies can be used to track browsing behavior. Why Do Some People Dislike Cookies?

Search Engines Search engines have and use the ability to track each one of your searches by IP addresses, search terms, time, etc. How Is My Personal Information Revealed?

Search Engines August 7, 2006: AOL apologized for releasing search log data on subscribers. Almost two weeks before that, AOL had quietly released roughly 20 million search records from 658,000 users. In January 2006, the US Department of Justice issued a subpoena asking popular search engines to provide a “random sampling” of 1 million IP addresses and search queries submitted over a one-week period. Microsoft, Yahoo, and AOL complied, while Google fought the subpoena. How Is My Personal Information Revealed?

Official Use Court Records: When you file a lawsuit for divorce or are a party to a civil lawsuit or criminal case, court records are accessible to the public. Government: The government may want your personal information for law enforcement purposes as well as for foreign intelligence investigations. Various laws govern these procedures. How Is My Personal Information Revealed?

Cookie controls – check your computer settings Anti-virus software and firewalls Raise awareness of privacy Learn to safeguard your privacy Solution to Protect Online Privacy

Download and read the article “School District Hires Company to Monitor Students” and answer the questions that follow. Your Task