O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Privacy issues and internet privacy

16.879 visualizações

Publicada em

  • Entre para ver os comentários

Privacy issues and internet privacy

  1. 1. Privacy Issues and Internet Privacy<br />By,<br />Vinyas S<br />
  2. 2. Information technology<br /> -> Collects, stores, integrates and retrieves data and information<br />Store and Retrieve information!!!<br /> -> a Negative impact on right to Privacy???<br />Introduction<br />
  3. 3. The ability of an individual or group to secluded themselves or information about themselves and thereby reveal it selectively<br />A personal, subjective condition. One person cannot decide for another what his or her sense of privacy should be<br />Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public<br />What Is Privacy?<br />6/9/2011<br />3<br />
  4. 4. Violation of Privacy<br />Computer Monitoring<br />Computer Matching<br />Unauthorized Personal Files<br />Eg. for Privacy Issues<br />
  5. 5. How our Personal Information Gets Revealed<br />6/9/2011<br />5<br />
  6. 6.
  7. 7. Internet Service Providers (ISP) always know your IP address and the IP address to which you are communicating<br />ISPs are capable of observing unencrypted data passing between you and the Internet, but not properly-encrypted data <br />They are usually prevented to do so due to social pressure and law.<br />By ISP<br />6/9/2011<br />7<br />
  8. 8. May be inappropriately spread by the original receiver <br />May be intercepted<br />May be legally viewed or disclosed by service providers or authorities<br />By Email<br />6/9/2011<br />8<br />
  9. 9. Any member of the list or group could collect and distribute your Email address and information you post<br />By Discussion groups<br />6/9/2011<br />9<br />
  10. 10. Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries and password<br /> You may accidentally reveal such information when using a browser on a public computer or someone else's.<br />By Internet Browsers<br />6/9/2011<br />10<br />
  11. 11. Cookies are data packets sent by a server to a web client and then sent back unchanged by the client each time it accesses that server<br />Cookies are used for authenticating, session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts<br />Cookies are only data, not programs nor viruses<br />What are cookies?<br />6/9/2011<br />11<br />
  12. 12. A Sample of Cookie<br />6/9/2011<br />12<br />-->If you type JavaScript:alert(document.cookie)into the address bar, when logged onto a site, it is possible to see the cookies which have been set from that domain.<br />
  13. 13. Search engines have and use the ability to track each one of your searches (e.g. ,IP address, search terms, time)<br />By Search Engine<br />6/9/2011<br />13<br />
  14. 14. “August, 7, 2006, AOL apologized for releasing search log data on subscribers that had been intended for use with the company's newly launched research site. Almost 2 weeks before that, AOL had quietly released roughly 20 million search records from 658,000 users on their new AOL Research site. The data includes a number assigned to the anonymous user, the search term, the date and time of the search, and the website visited as a result of the search.”<br />What search engines did?<br />6/9/2011<br />14<br />
  15. 15. Web bugs: <br /> -> A graphic (in a Web site or a graphic- enabled email) that can confirm when the message or Web page is viewed and record the IP address of the viewer<br />Third party cookies: <br /> -> Comes from web page may contain images or advertisements<br />By indirect Marketing<br />6/9/2011<br />15<br />
  16. 16. Employers and school officials are increasingly sensitive to the messages you convey in social networks <br />By Social Networks, Blog & Personal Websites<br />6/9/2011<br />16<br />
  17. 17. Want to be a hacker?<br />6/9/2011<br />17<br />
  18. 18. By Cybercrime<br />Spywaretakes advantage of security holes by attacking the browser and forcing it to be downloaded and installed and gather your information without your knowledge <br />Phishingoccurs when a criminal lures the victim into providing financial or personal data<br />Pharmingoccurs when criminals plant programs in the victim’s computer which re-direct the victim from legitimate Web sites to scam look-alike sites<br />18<br />6/9/2011<br />
  19. 19. Solutions to Protect Online Privacy <br />19<br />6/9/2011<br />
  20. 20. Cookie Controls<br />20<br />6/9/2011<br />
  21. 21. Other Technical Resorts<br />Anti-virus software<br />Firewalls<br />Encryption tools<br />21<br />6/9/2011<br />
  22. 22. The Platform for Privacy Preferences (P3P)<br />Developed by the World Wide Web Consortium (W3C) <br />A protocol allowing websites to declare their intended use of information they collect about browsing users and allow users to configure their browsers or other software tools in such a way that they are notified whether web site privacy policies match their pre-set preferences<br />22<br />6/9/2011<br />
  23. 23. The Only Two Absolute Choices<br />Avoid yourself from the Internet<br />1) Raise awareness of privacy<br />2) Learn to safeguard your privacy with a minimum sacrifice of convenience <br />23<br />6/9/2011<br />
  24. 24. THANK YOU!!!!!<br />