Anonymity, Security, Privacy and Civil Liberties

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved 3-1 LEGAL AND ETHICAL ISSUES in Medical Practice, Including HIPAA PowerPoint® presentation.
Interaction of RFID Technology and Public Policy Presentation at RFID Privacy MIT 15 TH November 2003 By Rakesh Kumar
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
Credit Card Fingerprint Scanner Dennis Seran CS 410 / Spring 2004.
Security+ Guide to Network Security Fundamentals
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
Chapter 10 Privacy and Security McGraw-Hill
Cyberculture and Privacy Baase, Chp 2. Cyberculture and Privacy A.Computers and Privacy Computers are not needed for the invasion of privacy. 1.Computers.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Internet Ethics Presented by: Daniel Wu Kalven Wu.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Session 3 – Information Security Policies
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Maintaining & Reviewing a Web Application’s Security By: Karen Baldacchino Date: 15 September 2012.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Engineering Security Requirement
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
HIPAA PRIVACY AND SECURITY AWARENESS.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Internet Security for Small & Medium Business Week 6
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Ethical and Social...J.M.Kizza1 Module 4: Anonymity, Security and Privacy  Introduction  Anonymity  Security  Privacy  Ethical and Social Issues.
LEGAL CHALLENGES & STRATEGIES IN E-PROCUREMENT IN CONSTRUCTION
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
ETHICS, POLICY & SECURITY ISSUES
ETHICS, POLICY & SECURITY ISSUES
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
PricewaterhouseCoopers 1 Administrative Simplification: Privacy Audioconference April 14, 2003 William R. Braithwaite, MD, PhD “Doctor HIPAA” HIPAA Today.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Privacy and Free Speech: It's Good for Business Nicole A. Ozer, Esq. Technology and Civil Liberties Policy Director ACLU of Northern California Online.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Lecture4 Information Privacy 1-1. Overview Introduction Perspectives on privacy Information disclosures Data mining 1-2.
Information Security and Privacy in HRIS
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
CJA 314 Week 5 Learning Team Criminology in the Future Paper and Presentation To purchase this material link
CJA 314 Week 5 Learning Team Criminology in the Future Paper and Presentation To purchase this material link
Privacy and the Law.
Add video notes to lecture
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Who Uses Encryption? Module 7 Section 3.
Privacy and Information
INFORMATION SYSTEMS SECURITY and CONTROL
Accounting Information Systems & Computer Fraud
Presentation transcript:

Anonymity, Security, Privacy and Civil Liberties Introduction Anonymity Security Privacy Ethical and Social Issues Ethical and Social...J.M.Kizza

Introduction The danger for misuse is real Information has increased in value Information can also be a liability The demand for information is high due to: High digitalization of info & increasing bandwidth. Declining costs of digital communication. Increased miniaturization Portable computers Other communications equipment. Greater public awareness The danger for misuse is real

Anonymity Absence of identity There are three types of identity: Pseudo – know by a pseudo-name Untraceable – no name association Anonymity with a pseudo address No name association Address association Anonymity on the Internet Anonymous servers Anonymous users There is no 100% anonymity on the internet

Advantages and Disadvantages of Anonymity Used by or as a form of whistle-blowing National security Prevent intimidation and fear of reprisal Security of individuals Disadvantages Criminals Dispute resolution Circumventing the law Cyber-stalking

Security Means to prevent unauthorized access Consists of: Confidentiality - to prevent unauthorized disclosure of information to third parties. Integrity - to prevent unauthorized modification of files and maintain the status quo Availability -: to prevent unauthorized withholding of information from those who need it when they need it.

Security… Physical security – guaranteed by: Physical Access Controls Deterrence Prevention Detection Response Physical Access Controls Authenticate the user Information Security Controls Cryptography Authentication Audit Operational Policies and guidelines

Privacy Human value Consists of: Right to control external influences Solitude - right to be alone Anonymity – right to have no public identity Intimacy – right not to be monitored Right to control personal information: Reserve – right to control one’s information

Types of Privacy Personal Privacy Informational Privacy Personal space Physical searches Video recording Surveillance Informational Privacy Personal information Financial information Medical information Internet Institutional Privacy

Value of Privacy Considered valuable Value eroding because inability to guarantee Three attributes Personal identity Autonomy Social Relationships Information gathering Buying and selling information We provide some of this information Internet crawlers

Privacy Violations Intrusion – wrongful entry, seizing or acquiring Misuse of Information – selling of our information Interception of Information – eavesdropping Surveillance Information Matching

Ways We Give Out Information Rewards or Loyalty Programs Body Scanners Digital Video Recorders Automobile “Black Boxes” Enhanced 911 Service RFIDs Implanted Chips Medical information Replace credit cards Cookies Biometrics Spyware

Privacy Protection and Civil Liberties Most accepted set of civil liberties Criminal Justice Police powers Person liberty Right to fair trail Basic freedoms Speech Assembly Association Movement No Discrimination Freedom of information Communications and privacy

Privacy Protection and Civil Liberties Safeguards Technical Use of software and technical safeguards Contractual Contacts Special information – publications Must have actions and enforcement to be effective Legal Laws Enforcement of the laws