Presentation is loading. Please wait.

Presentation is loading. Please wait.

Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.

Similar presentations


Presentation on theme: "Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues."— Presentation transcript:

1 Allison Gladkowski

2  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues  Protection tips  The future

3  Privacy- an individuals ability to restrict or eliminate the collection, use, and sale of confidential personal information.  Argued that privacy isn't an issue unless you have something to hide.

4  The right to informed decision making  Decide who sees your information  The right to control  Total control of your own data  The right to leave  Delete, not just disable

5  Security breaches can still happen to disabled accounts  You give consent to give your info, but then companies sell it  Spyware – software that collects your personal data

6  Cookies – allows companies to track what you do online  Banner ads – targeted to match your browsing habits  Keyloggers – records passwords and account numbers

7  File Infectors – viruses attached to a file  Payload – dangerous action virus takes  SPIM – spam text instant message  Malware – (malicious software) damages or infiltrates computer  Phishing – posing as a company to get your information  Swindlers – bogus, at-home scams

8  Identity Theft – obtains information to impersonate you  Forgery – making data appear like it comes from another user  Hackers – people or programs that take over capability of your computer

9  Corporate Espionage – unauthorized access to corporate information  Crackers (Black Hats) – gain entry to highly secured systems  Ethical Hackers (White Hats) – use their hacking abilities to better defense  Memory Shaving – Stealing your RAM

10  Cyber Stalking, Cyber Bullying, RFID  Radio Frequency Identification (RFID) – radio waves track chips in an object  Identity thieves are now using RFID readers to hack your credit card and your identity

11  Companies can legally monitor their employees when they are using the company equipment – even if you are connected to their WIFI on your own device  Use your own device on your own time  Monitoring mainly for productivity, efficiency, and competition

12

13 1. Surf the web anonymously 2. Create strong passwords 3. Have a “throwaway” email for social media and store ads 4. Biometric Authentication – physical trait logins  Ex: fingerprint or retinal scanner

14  Mark Weiser coined the term Ubiquitous Computing  Ubiquitous Computing – computing everywhere, embedded in our lives, and being placed in everything  He predicts we will sacrifice privacy for convenience as technology grows

15  Privacy is important to protect yourself from security breaches and scams  People can steal your identity on or offline and it can take many forms  Unapproved access is illegal, but can help a corporation (white hats)  You can better protect yourself by making “stronger” passwords and using biometric authentication logins  The future predicts technology will be in every aspect of our lives & less privacy

16


Download ppt "Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues."

Similar presentations


Ads by Google