Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
IDENTITY THEFT By Beaudan S and Tazwaar A. Identity Theft Identity theft is hard to protect against because hackers are getting better and better and.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
BUSINESS PLUG-IN B6 Information Security.
Security, Privacy, and Ethics Online Computer Crimes.
Computers Are Your Future Tenth Edition
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Privacy, Security and Ethics
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Technical Implementation: Security Risks
Done by… Hanoof Al-Khaldi Information Assurance
Hotspot Shield Protect Your Online Identity
3.6 Fundamentals of cyber security
IT Security  .
Information Security 101 Richard Davis, Rob Laltrello.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Year 10 ICT ECDL/ICDL IT Security.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Privacy, Crime, and Security
Internet Safety Vocabulary
Philip Nichilo Vincent Carestia
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ICT Communications Lesson 3: Internet Life and Privacy
How to keep the bad guys out and your data safe
Computer Security.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Presentation transcript:

Allison Gladkowski

 About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues  Protection tips  The future

 Privacy- an individuals ability to restrict or eliminate the collection, use, and sale of confidential personal information.  Argued that privacy isn't an issue unless you have something to hide.

 The right to informed decision making  Decide who sees your information  The right to control  Total control of your own data  The right to leave  Delete, not just disable

 Security breaches can still happen to disabled accounts  You give consent to give your info, but then companies sell it  Spyware – software that collects your personal data

 Cookies – allows companies to track what you do online  Banner ads – targeted to match your browsing habits  Keyloggers – records passwords and account numbers

 File Infectors – viruses attached to a file  Payload – dangerous action virus takes  SPIM – spam text instant message  Malware – (malicious software) damages or infiltrates computer  Phishing – posing as a company to get your information  Swindlers – bogus, at-home scams

 Identity Theft – obtains information to impersonate you  Forgery – making data appear like it comes from another user  Hackers – people or programs that take over capability of your computer

 Corporate Espionage – unauthorized access to corporate information  Crackers (Black Hats) – gain entry to highly secured systems  Ethical Hackers (White Hats) – use their hacking abilities to better defense  Memory Shaving – Stealing your RAM

 Cyber Stalking, Cyber Bullying, RFID  Radio Frequency Identification (RFID) – radio waves track chips in an object  Identity thieves are now using RFID readers to hack your credit card and your identity

 Companies can legally monitor their employees when they are using the company equipment – even if you are connected to their WIFI on your own device  Use your own device on your own time  Monitoring mainly for productivity, efficiency, and competition

1. Surf the web anonymously 2. Create strong passwords 3. Have a “throwaway” for social media and store ads 4. Biometric Authentication – physical trait logins  Ex: fingerprint or retinal scanner

 Mark Weiser coined the term Ubiquitous Computing  Ubiquitous Computing – computing everywhere, embedded in our lives, and being placed in everything  He predicts we will sacrifice privacy for convenience as technology grows

 Privacy is important to protect yourself from security breaches and scams  People can steal your identity on or offline and it can take many forms  Unapproved access is illegal, but can help a corporation (white hats)  You can better protect yourself by making “stronger” passwords and using biometric authentication logins  The future predicts technology will be in every aspect of our lives & less privacy