“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.

Slides:



Advertisements
Similar presentations
Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
Advertisements

Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Web server security Dr Jim Briggs WEBP security1.
SPYWARE  Do you know where your personal information is?
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety By Lydia Snowden.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Privacy, Confidentiality, Security, and Integrity of Electronic Data
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Internet Safety Internet Safety LPM
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Computer Security By Duncan Hall.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Computer Security Keeping you and your computer safe in the digital world.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Privacy and the Law.
GCSE ICT SECURITY THREATS.
Protect Your Computer Against Harmful Attacks!
CompTIA Security+ Study Guide (SY0-401)
Chapter 10: Privacy, Security, and Ethics
Protecting Yourself from Fraud including Identity Theft
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Social Issues in Computing
Social Issues in Computing
Presentation transcript:

“Breach of Privacy” nPresented by Sumit Yadav

Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability

Computer Science and Engineering What is privacy? nFor citizens and consumers, freedom from unauthorized intrusion. For organizations, privacy involves the policies that determine what information is gathered, how it is used, and how customers are informed and involved in this process. Privacy is a legal issue, but it's also an information security issue.

Computer Science and Engineering How your privacy can be breached? nCookies nKeylooger n spyware (adware)

Computer Science and Engineering Cookies nData files can be store and fetch by remote server nWhat they can store ? nHow you can prevent? n Setting the Privacy level to High in the browser n Zonealarm with new privacy protection feature

Computer Science and Engineering Key logger nsurveillance tool that records every keystroke nWhat it is used for ? n Employer monitoring their employees. n Monitoring kids activity nWhat if it is abused? n Remotely installing key logger nPrevention n Installing anti spy software

Computer Science and Engineering Spy ware n Spy ware modules are created by marketers who want to monitor your customer’s browsing habits. n What is ad ware? n Indication of spy ware n Web sites never seen before are suddenly visible. n Strange toolbar n How to protect yourself from spy ware n Installing Spybot and Ad-Aware.

Computer Science and Engineering What to do to improve privacy? n Keep your windows up to date by installing critical updates n Back up regularly n Keep security programs up to date n Surf safely n Be vary of attachments n Don’t swallow the spam: go to for list of internet scams. n Check start-up processes-Launch Msconfig(startup) check with for unfamiliar entries.

Computer Science and Engineering What to do to improve privacy? TOR(Open Source Project ) n An open-source project, Tor seeks to provide anonymity through a technique called onion routing.Onion routing basically works by implementing numerous routers through which communications will pass. n For more info: ( net/tor)

Computer Science and Engineering What if everybody get privacy? nPositive impact n People will be able to surf the web without being traced. n Agents can more easily carry out research and investigations without reveling their identity. nNegative impact n Hacker steal credit card without being caught. n Virus can spread with no knowledge of its origin. Negative effect on law enforcement making possible for criminals and terrorists to elude the law.

Computer Science and Engineering Case Study-Google nGoogle’s service (gmail) n Google scan thought your s and look for keywords n Google target adds on your system according to the keywords it has collected nGoogle desktop software n Now you can Google your pc Google desktop can search your Outlook / Outlook Express,websites and other documents n Risk of privacy if it’s a public computer

Computer Science and Engineering Gramm Leach Bliley Act (GLBA), n Financial institution must provide customers clear and conspicuous notice about its privacy policies n Institution must provide annual notices of its privacy policies and practices nFinancial institution must provide customers with an opportunity to opt out of disclosures of their non-public personal information

Computer Science and Engineering HIPPA (Health Care Portability and Accountability Act) npatients’ access to their own medical records nNotice of privacy practices nLimitations on use of personal medical information nRestrictions on marketing medical information nConfidentiality of doctor patient communications

Computer Science and Engineering U.S. Privacy Act nProtects the privacy of personal data collected by the government nAllow individuals to determine what data collected and for what purpose nTo whom information has been disseminated

Computer Science and Engineering U.S. Electronic Communications Privacy Act nProtects against wiretapping nAllows law enforcement agencies to access communicating or records of them nISP need to install equipments to allow access to agencies ISP can read content of communicating in order to improve security and integrity

Computer Science and Engineering USA Patriot Act n Knowingly causing the transmission of code resulting in damage to a protected computer is an offence nRecklessly causing damage to a computer system as a consequence of unauthorized access is also an offence nCausing damage (even unintentionally) as a consequence of unauthorized access to a protected computer is a crime

Computer Science and Engineering Reference nPfleeger, Charles and Pfleeger, Shari. “Security in Computing.” kie,ip,url,uid&db=cph&an= kie,ip,url,uid&db=cph&an= kie,ip,url,uid&db=cph&an= kie,ip,url,uid&db=cph&an= kie,ip,url,uid&db=cph&an= kie,ip,url,uid&db=cph&an= n kie,ip,url,uid&db=cph&an= kie,ip,url,uid&db=cph&an=