SlideShare una empresa de Scribd logo
1 de 13
COMPUTER SECURITY
          & PRIVACY

Presented by: Yvette Cedano
Internet Monitoring
(Surveillance): Tracking
 Network Surveillance:
 Corporate Surveillance:
Cloud Computing
   3 categories:
     Infrastructure-as-a-Service
     Platform-as-a-Service
     Software-as-a-Service
   3 characteristics:
     Sold on demand (by minute or hour)
     Elastics: user has as much / little service as wanted at any time
     Service fully managed by provider
   Private or public:
Internet Parental Control
Software
 “Safe Eyes” Parental Control
CAPTCHA


 Challenge response test
 http://www.captcha.net/
Internet Anonymity
 Ability to conceal your identity while communicating with
  others
 Full anonymity not guaranteed
Radio Frequency
              Identification
 Small electronic devices
 Same effect as bar code / magnetic strip on credit card
 Reader collision:
 Tag collisions:
Internet Security & Privacy Act 2010


 No state agency can collect / share user info through
  internet
 State can only collect / disclose info if:
Sources
   1. Internet Monitoring Software:
        http://pcmonitoringsoftwares.net/what-is-internet-monitoring-software/
   2. Cloud Computing:
       http://searchcloudcomputing.techtarget.com/definition/cloud-computing
   3. Parental Control:
       http://www.internetsafety.com/safe-eyes-parental-control-software.php?gclid=CLLl-
        smy86wCFQPe4AodnH1Btw
       http://www.monitoringsoftwarereviews.org/
   4. CAPTCHA:
       http://www.google.com/recaptcha/captcha
   5. Internet Anonymity:
        http://epic.org/privacy/anonymity/
   6. RFID:
       http://www.technovelgy.com/ct/Technology-Article.asp
   7. Internet Security & Privacy Act:
        http://law.justia.com/codes/new-york/2010/stt/article-2/

       GOOGLE IMAGES

Más contenido relacionado

La actualidad más candente

Security Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessSecurity Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessCatherine MacAllister
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessMegan Bell
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsCatherine MacAllister
 
Hi security in telemedicine
Hi   security in telemedicineHi   security in telemedicine
Hi security in telemedicinejbarbudo
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityColin English
 
Cocoon On Internet Security
Cocoon On Internet SecurityCocoon On Internet Security
Cocoon On Internet SecurityCOCOON
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesrebelreg
 
Deviceidentity 150909102029-lva1-app6891
Deviceidentity 150909102029-lva1-app6891Deviceidentity 150909102029-lva1-app6891
Deviceidentity 150909102029-lva1-app6891Lan & Wan Solutions
 
Phishing Detection using Machine Learning
Phishing Detection using Machine LearningPhishing Detection using Machine Learning
Phishing Detection using Machine LearningArjun BM
 
Root conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmRoot conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmArjun BM
 
Uop cis 349 final exam guide set 1 new
Uop cis 349 final exam guide set 1 newUop cis 349 final exam guide set 1 new
Uop cis 349 final exam guide set 1 newuopassignment
 
Stayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newStayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newshyaminfo17
 
Stayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newStayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newTristanmillerr
 

La actualidad más candente (17)

Security Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessSecurity Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 Wireless
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
 
Security Software
Security SoftwareSecurity Software
Security Software
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info Wireless
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
 
Hi security in telemedicine
Hi   security in telemedicineHi   security in telemedicine
Hi security in telemedicine
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Cocoon On Internet Security
Cocoon On Internet SecurityCocoon On Internet Security
Cocoon On Internet Security
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Deviceidentity 150909102029-lva1-app6891
Deviceidentity 150909102029-lva1-app6891Deviceidentity 150909102029-lva1-app6891
Deviceidentity 150909102029-lva1-app6891
 
Phishing Detection using Machine Learning
Phishing Detection using Machine LearningPhishing Detection using Machine Learning
Phishing Detection using Machine Learning
 
Root conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmRoot conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbm
 
Uop cis 349 final exam guide set 1 new
Uop cis 349 final exam guide set 1 newUop cis 349 final exam guide set 1 new
Uop cis 349 final exam guide set 1 new
 
Broken access control
Broken access controlBroken access control
Broken access control
 
Stayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newStayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 new
 
Digital security
Digital securityDigital security
Digital security
 
Stayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newStayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 new
 

Destacado

Why International Students Choose San Jose State University
Why International Students Choose San Jose State UniversityWhy International Students Choose San Jose State University
Why International Students Choose San Jose State UniversitySan Jose State University
 
Prepare for an MMA Fight
Prepare for an MMA FightPrepare for an MMA Fight
Prepare for an MMA Fightromerox25
 
Facebook Apps
Facebook AppsFacebook Apps
Facebook Appscustomit
 
Ext js saas&compass
Ext js saas&compassExt js saas&compass
Ext js saas&compasselitonweb
 
Guidence and counselling plan final 1
Guidence and counselling plan final 1Guidence and counselling plan final 1
Guidence and counselling plan final 1RodriguezAnaC
 
Neoclassical theatre (2)
Neoclassical theatre (2)Neoclassical theatre (2)
Neoclassical theatre (2)Maddy Underwood
 
School guidance plan
School guidance planSchool guidance plan
School guidance planRodriguezAnaC
 
SchoolGuidanceAndCounselling
SchoolGuidanceAndCounsellingSchoolGuidanceAndCounselling
SchoolGuidanceAndCounsellingRodriguezAnaC
 
School Guidance and Counselling
School Guidance and CounsellingSchool Guidance and Counselling
School Guidance and CounsellingRodriguezAnaC
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadanajarida_paz
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadanajarida_paz
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadanajarida_paz
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadanajarida_paz
 

Destacado (18)

Why International Students Choose San Jose State University
Why International Students Choose San Jose State UniversityWhy International Students Choose San Jose State University
Why International Students Choose San Jose State University
 
Prepare for an MMA Fight
Prepare for an MMA FightPrepare for an MMA Fight
Prepare for an MMA Fight
 
Facebook Apps
Facebook AppsFacebook Apps
Facebook Apps
 
Ext js saas&compass
Ext js saas&compassExt js saas&compass
Ext js saas&compass
 
Presentation1
Presentation1Presentation1
Presentation1
 
Guidence and counselling plan final 1
Guidence and counselling plan final 1Guidence and counselling plan final 1
Guidence and counselling plan final 1
 
Neoclassical theatre (2)
Neoclassical theatre (2)Neoclassical theatre (2)
Neoclassical theatre (2)
 
School guidance plan
School guidance planSchool guidance plan
School guidance plan
 
SchoolGuidanceAndCounselling
SchoolGuidanceAndCounsellingSchoolGuidanceAndCounselling
SchoolGuidanceAndCounselling
 
School Guidance and Counselling
School Guidance and CounsellingSchool Guidance and Counselling
School Guidance and Counselling
 
буяа нбб үндэс
буяа нбб үндэсбуяа нбб үндэс
буяа нбб үндэс
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadana
 
Abstract Area C
Abstract Area CAbstract Area C
Abstract Area C
 
лекц 3
лекц 3лекц 3
лекц 3
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadana
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadana
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadana
 
Ace
AceAce
Ace
 

Similar a Final Powerpoint Presentation

Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010wegdam
 
Cyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptxCyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptxAnandarajSathianatha
 
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platformSFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platformSouth Tyrol Free Software Conference
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
IoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - AllottIoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - Allottwebinos project
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottwebinos project
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Vikalp Sharma
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationTELKOMNIKA JOURNAL
 
DEVNET-1180 Security from the Cloud
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the CloudCisco DevNet
 
Trends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengulTrends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengulCigdem Sengul
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Borensegughana
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases101 Blockchains
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd Iaetsd
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyIRJET Journal
 

Similar a Final Powerpoint Presentation (20)

Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010
 
Cyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptxCyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptx
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platformSFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
IoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - AllottIoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - Allott
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allott
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual Authentication
 
DEVNET-1180 Security from the Cloud
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the Cloud
 
Trends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengulTrends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengul
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
Panel 8-The future of authentication
Panel 8-The future of authenticationPanel 8-The future of authentication
Panel 8-The future of authentication
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain Technology
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Final Powerpoint Presentation

  • 1. COMPUTER SECURITY & PRIVACY Presented by: Yvette Cedano
  • 3.  Network Surveillance:  Corporate Surveillance:
  • 5. 3 categories:  Infrastructure-as-a-Service  Platform-as-a-Service  Software-as-a-Service  3 characteristics:  Sold on demand (by minute or hour)  Elastics: user has as much / little service as wanted at any time  Service fully managed by provider  Private or public:
  • 7.  “Safe Eyes” Parental Control
  • 8. CAPTCHA  Challenge response test  http://www.captcha.net/
  • 10.  Ability to conceal your identity while communicating with others  Full anonymity not guaranteed
  • 11. Radio Frequency Identification  Small electronic devices  Same effect as bar code / magnetic strip on credit card  Reader collision:  Tag collisions:
  • 12. Internet Security & Privacy Act 2010  No state agency can collect / share user info through internet  State can only collect / disclose info if:
  • 13. Sources  1. Internet Monitoring Software:  http://pcmonitoringsoftwares.net/what-is-internet-monitoring-software/  2. Cloud Computing:  http://searchcloudcomputing.techtarget.com/definition/cloud-computing  3. Parental Control:  http://www.internetsafety.com/safe-eyes-parental-control-software.php?gclid=CLLl- smy86wCFQPe4AodnH1Btw  http://www.monitoringsoftwarereviews.org/  4. CAPTCHA:  http://www.google.com/recaptcha/captcha  5. Internet Anonymity:  http://epic.org/privacy/anonymity/  6. RFID:  http://www.technovelgy.com/ct/Technology-Article.asp  7. Internet Security & Privacy Act:  http://law.justia.com/codes/new-york/2010/stt/article-2/  GOOGLE IMAGES