SlideShare a Scribd company logo
1 of 5
The Effects Of The Use Of On-Line Services On Security & Privacy of Data   Mr. Powell
Need to protect confidentiality of data  ,[object Object],[object Object],[object Object],[object Object]
Data protection legislation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social and ethical implications ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Measures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
3. use of ict in time management
3. use of ict in time management3. use of ict in time management
3. use of ict in time managementMISY
 
2b working practices
2b working practices2b working practices
2b working practicesMISY
 
Robots and cars ca
Robots and cars caRobots and cars ca
Robots and cars caMISY
 
Ict in advertising ca
Ict in advertising caIct in advertising ca
Ict in advertising caMISY
 
Payroll applications new
Payroll applications newPayroll applications new
Payroll applications newMISY
 
Use of ict in advertising
Use of ict in advertisingUse of ict in advertising
Use of ict in advertisingMISY
 
Data management new
Data management newData management new
Data management newMISY
 
Uses of dbms
Uses of dbmsUses of dbms
Uses of dbmsMISY
 

Viewers also liked (9)

3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
3. use of ict in time management
3. use of ict in time management3. use of ict in time management
3. use of ict in time management
 
2b working practices
2b working practices2b working practices
2b working practices
 
Robots and cars ca
Robots and cars caRobots and cars ca
Robots and cars ca
 
Ict in advertising ca
Ict in advertising caIct in advertising ca
Ict in advertising ca
 
Payroll applications new
Payroll applications newPayroll applications new
Payroll applications new
 
Use of ict in advertising
Use of ict in advertisingUse of ict in advertising
Use of ict in advertising
 
Data management new
Data management newData management new
Data management new
 
Uses of dbms
Uses of dbmsUses of dbms
Uses of dbms
 

More from MISY

Ict in time management ca
Ict in time management caIct in time management ca
Ict in time management caMISY
 
Ict in publishing ca
Ict in publishing caIct in publishing ca
Ict in publishing caMISY
 
Ict in teaching learning ca
Ict in teaching  learning caIct in teaching  learning ca
Ict in teaching learning caMISY
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data ProtectionMISY
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3d - Working Practices
3d - Working Practices3d - Working Practices
3d - Working PracticesMISY
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
1ab Input Output Devices
1ab   Input Output Devices1ab   Input Output Devices
1ab Input Output DevicesMISY
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
1cd Output
1cd   Output1cd   Output
1cd OutputMISY
 
1gh Role Of Communications Systems
1gh   Role Of Communications Systems1gh   Role Of Communications Systems
1gh Role Of Communications SystemsMISY
 
1f Backup
1f   Backup1f   Backup
1f BackupMISY
 
Ie Storage, Multimedia And File Organization
Ie   Storage, Multimedia And File OrganizationIe   Storage, Multimedia And File Organization
Ie Storage, Multimedia And File OrganizationMISY
 
Ie Storage Devices
Ie   Storage DevicesIe   Storage Devices
Ie Storage DevicesMISY
 

More from MISY (14)

Ict in time management ca
Ict in time management caIct in time management ca
Ict in time management ca
 
Ict in publishing ca
Ict in publishing caIct in publishing ca
Ict in publishing ca
 
Ict in teaching learning ca
Ict in teaching  learning caIct in teaching  learning ca
Ict in teaching learning ca
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3d - Working Practices
3d - Working Practices3d - Working Practices
3d - Working Practices
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
1ab Input Output Devices
1ab   Input Output Devices1ab   Input Output Devices
1ab Input Output Devices
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
1cd Output
1cd   Output1cd   Output
1cd Output
 
1gh Role Of Communications Systems
1gh   Role Of Communications Systems1gh   Role Of Communications Systems
1gh Role Of Communications Systems
 
1f Backup
1f   Backup1f   Backup
1f Backup
 
Ie Storage, Multimedia And File Organization
Ie   Storage, Multimedia And File OrganizationIe   Storage, Multimedia And File Organization
Ie Storage, Multimedia And File Organization
 
Ie Storage Devices
Ie   Storage DevicesIe   Storage Devices
Ie Storage Devices
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

3e - The Effects Of The Use Of On Line Services On Security & Privacy

  • 1. The Effects Of The Use Of On-Line Services On Security & Privacy of Data Mr. Powell
  • 2.
  • 3.
  • 4.
  • 5.

Editor's Notes

  1. Confidentiality is ensuring that information is accessible only to those of information security. Confidentiality is maintained in most on-line systems by the techniques of modern cryptography. User and payment data is encrypted by SSL when it is transferred on the Internet. Quality seals can be placed on the Shop webpage if it has undergone an independent assessment and meets all requirements of the company issuing the seal. The purpose of these seals is to increase the confidence of the online shoppers; the existence of many different seals foils this effort to a certain extent. The ability of the online merchant to determine the identity of the purchaser is still the major security issue. Repudiations (disownership) of involvement with online transactions can happen even 6 months after the date of transaction. Privacy of personal information is a big issue. In spite of Privacy Guidelines of the OECD , for example, privacy violations still occur and hamper eCommerce from developing to its full potential.
  2. Data protection legislation Data protection acts exist in most countries. These set down rules for keeping data private as well as confidential. UK Data Protection Act. The development of new technology has meant that many organisations store and process personal details on computer.  This may be data on customers, employees, suppliers, competitors, etc.  This has worried many people whose main concerns are: Who will be able to access this data?   Will information about me be available over the Internet, and therefore vulnerable to hackers?  Can my records be sold on to someone else? Is the data accurate? If it is stored, processed and transmitted by computer, who will check that it is accurate? People often think it must be true if 'it says so on the computer'. Will the data be sold on to another company? For example, could my health records be sold to a company where I have applied for a job? Could my personal details, collected by my employer, be used by a commercial company for targeting junk mail? Will data about me be stored even if it is not needed? If the original reason for having the data has passed, can the data still be kept? There was an earlier Data Protection Act in 1984 which set out to address some of these problems.  However, technology had moved on, and it was found that many things were no longer covered by this Act.  Therefore, in 1998, an updated version was passed.
  3. Social and ethical implications of access to personal information Duty of confidence – Everyone working for or with an organization that records, handles, stores or otherwise comes across information has a personal common law duty of confidence to clients and to his or her employer. Responsibilities for passing on information – Organization are accountable for their decisions to pass on information. Only the minimum identifiable information should be used. Anonymised information – Where anonymised information would be sufficient for a particular purpose, identifiable information should be omitted wherever possible. Aggregated information – aggregating selective information about a small number of clients may not always safeguard confidence adequately. If confidence is breached – Organization are strongly advised to include a duty of confidence requirement in employment contracts. Clients who feel that confidence has been breached should be able to use complaints procedures against the organization. Give some example of how large organization such as the UK NHS deals with confidentiality.
  4. E4-Need for security Security measures – under the Data Protection Act security measures must be in place with an organization to protect computerized information. Protection through single password authentication , as is the case in most secure Internet shopping sites, is not considered secure enough for personal online banking applications in some countries. Online banking user interfaces are secure sites (generally employing the https protocol) and traffic of all information - including the password - is encrypted, making it next to impossible for a third party to obtain or modify information after it is sent. However, encryption alone does not rule out the possibility of hackers gaining access to vulnerable home PCs and intercepting the password as it is typed in ( keystroke logging ). There is also the danger of password cracking and physical theft of passwords written down by careless users. Many online banking services therefore impose a second layer of security . Strategies vary, but a common method is the use of transaction numbers, or TANs , which are essentially single use passwords. Another strategy is the use of two passwords, only random parts of which are entered at the start of every online banking session. This is however slightly less secure than the TAN alternative and more inconvenient for the user. A third option, used in many European countries and currently being trialled in the UK is providing customers with security token devices capable of generating single use passwords unique to the customer's token (this is called two-factor authentication or 2FA). Another option is using digital certificates , which digitally sign or authenticate the transactions, by linking them to the physical device (e.g. computer, mobile phone , etc). Fraud Some customers avoid online banking as they perceive it as being too vulnerable to fraud. The security measures employed by most banks can never be completely safe, but in practice the number of fraud victims due to online banking is very small. This is probably due to the fact that a relatively small number of people use Internet banking compared with the total number of banking customers world wide. Indeed, conventional banking practices may be more prone to abuse by fraudsters than online banking[ Who says this? ]. Credit card fraud , signature forgery and identity theft are far more widespread "offline" crimes than malicious hacking . Bank transactions are generally traceable and criminal penalties for bank fraud are high. Online banking becomes less secure if users are careless, gullible or computer illiterate. An increasingly popular criminal practice to gain access to a user's finances is phishing , whereby the user is in some way persuaded to hand over their password(s) to a fraudster.