SlideShare una empresa de Scribd logo
1 de 18
GNED 190
INTERNET PRIVACY:
IS INTERNET PRIVACY DEAD, OR IS
IT STILL POSSIBLE TO PROTECT
YOURSELF?
By: Matthew Momney
ADVANCING TECHNOLOGY
With internet advancing as fast as it is, and the complexity of the
tools to use it ever-growing, it is possible for the everyday user to
maintain their own security on the web? How far does one have to
delve into the underbelly of the world wide web to obtain the privacy
they both want and deserve? The abusive capabilities that today’s
browsers have and the speed at which they can be used is astounding.
THE POTENTIAL RISKS
The main issue with maintaining privacy on the internet is the
fact that there are a number of different ways to access the information
necessary to abuse or cause harm to an internet user.
Whether it’s obtaining statistics and browsing information, or
spreading spyware and viruses, the techniques available are almost
effortless and do not take much experience to use.
SOCIAL MEDIA
One of the most common outlets for information about a user is
using social media. These websites provide valuable information at the
user’s own expense without necessarily meaning to.
Privacy settings are often secondary and take some navigating
to locate. Sites like Facebook.com for example have your privacy set to
open as a default for new users. They do prompt you to set privacy
settings, but operate them separately for each piece of content. You
may have your main profile page set to be viewed by only people you
have accepted as friends, however your profile pictures could be
viewable.
FACE RECOGNIZERS
The frightening thing about social media sites being open about
sharing information is the ability to use face recognizers to match your
face with that of the pictures on your profiles.
Experts were able to prove they could come up with social
insurance numbers with just a web cam, a face recognizer, and an
internet connection. Simple tasks that anyone with the tools can
accomplish.
FACE RECOGNIZERS CONT’D
With this same technology identity thieves are using, legitimately
run companies are gathering statistical information about their
customers.
By using the faces captured on their surveillance cameras and
matching them to social media profiles, their personal information can
be gathered and analyzed to better grasp their target audience.
PUBLIC PHOTOGRAPHS
Always an eerie thought is someone taking your photograph without
you knowing. Even more creepy is the fact that it’s not against the law in any
way if you’re in a public place.
Anyone has the freedom to capture your face in anyway and alter the
photo however they deem fit to post on the internet, and are only forced to
remove the image from where they posted it if compliance is not received from
the person in the photograph.
Even after the photograph is removed, it can be a lengthy process with
legal action to force the abuser to stop or international laws depending on
where they are located. By that time the damage that the photograph can
cause has already been done, and there’s no way to change the results.
HTTP COOKIES
The average user may know the browsers store them on their
computer, but most do not know how HTTP cookies work. An HTTP
cookie is a small piece of data sent from a website and stored on a
user’s computer when they access said website.
Unknowingly to the average internet user, cookies are very
useful in tracking the user’s movements on the website, how frequently
they view the pages, which pages they view the most, etc.
HTTP COOKIES CONT’D
The cookies are established to make internet browsing fast and
enjoyable, by decreasing the time it would take to load a page you’ve
previously been on, but there are malicious ways to abuse them.
Tracking cookies allow web profiling, where the user’s browser
history is obtained allowing them to get more personal information on
the user who visited the websites.
GOVERNMENT CONTROL
When referring to government control, an overall access and
censorship of the internet by the government to standards they deem fit.
This method of censorship is used by the Chinese Government
to restrict the internet users of their country from uploading any content
they see as negative towards their country.
The same type of idea was almost implemented in the United
States with the Stop Online Piracy Act (SOPA) and the Protect IP Act
(PIPA) which was introduced to stop copyright infringement, but in the
end would eliminate all of the user uploaded content and freedom the
internet has to offer.
STEPS TO SECURE YOURSELF:
Passwords
Securing your website accounts with strong passwords that
would be difficult to guess or decode. Include capital and small
caps, numbers, and even characters when available.
Choose different passwords for each account so the security
of each is just as tight. If one password is figured out, you would
not want them to then be able to access all of your accounts.
STEPS TO SECURE YOURSELF:
Virus Protection
It is paramount that you run a virus protection service on your
computer. There are so many doorways viruses can come
though, and it is not worth the risk not to be safe while connected
to the internet.
Many users have virus protection either preinstalled on the
machine or purchased, but don’t run the automatic updates.
Viruses are developed and updated just as fast as the virus
protection software, so it is vital to maintain up-to-date protection
software.
STEPS TO SECURE YOURSELF:
Google Yourself
It sounds strange, but a simple google search of yourself to
see what results come up is a good way to monitor your own
privacy.
There are ways to go about asking google to remove content
from their search engine if you find it inappropriate or slanderous
such as emails or forms in their privacy section of their site.
STEPS TO SECURE YOURSELF:
Limit the Content You Share
It might seem redundant to say, but be careful what content
you share on the internet. Information is the key to everything
online, and one piece can lead to a treasure trove of your own
personal identity.
Keep your social media profiles tidy. Sweep the bad stuff
under the rug so to speak and push the content out of sight with
a flood of posts if they’re not possible to remove.
ONLINE PROTECTION VIDEO
https://www.youtube.com/watch?v=daF-_Q9lfg0
The video plays in slideshow mode
OVERALL
It is not impossible to protect yourself from the malicious content
on the internet, but it does take some time and effort. Reading privacy
policies, checking privacy settings, and keeping an eye on what content
comes up in search engines about you.
The best protection is not allowing anything at all, but limiting the
amount of information you share, or using only one credit card for
example will provide better control if anything does go wrong.
Privacy is not dead, but you do have to bury your head in the ground to
stay safe.
DISCUSSION QUESTION
What do you think? Is internet privacy dead or is it still possible to
protect yourself?
THANK YOU!
Sources:
• Steve Rambam, Privacy is Dead, Get Over It,
https://www.youtube.com/watch?v=DaYn_PkrfvQ
• Privacy issues of Social networking sites –
http://www.isaca.org/Groups/Professional-English/security-
trend/GroupDocuments/Social-Media-Wh-Paper-26-May10-Research.pdf
• Discovered the article:
Online photos can reveal our private data say experts - BBC NEWS -
http://www.bbc.co.uk/news/technology-14386514
• Linked to from BBC NEWS:
More Than Facial Recognition - Carnegie Mellon University -
http://www.cmu.edu/homepage/society/2011/summer/facial-recognition.shtml

Más contenido relacionado

La actualidad más candente

Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
charlesgarrett
 

La actualidad más candente (20)

Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Online Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and TeachersOnline Safety 3.0 - Presentation for Parents and Teachers
Online Safety 3.0 - Presentation for Parents and Teachers
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Children and future internet
Children and future internetChildren and future internet
Children and future internet
 
Computer security
Computer securityComputer security
Computer security
 
A Quick Online Safety Presentation
A Quick Online Safety PresentationA Quick Online Safety Presentation
A Quick Online Safety Presentation
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Online relationships - the future of friendship?
Online relationships - the future of friendship?Online relationships - the future of friendship?
Online relationships - the future of friendship?
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.9 Elements of Digital Citizenship and the 5 fluencies.
9 Elements of Digital Citizenship and the 5 fluencies.
 
Social Media on Education and its Effects
Social Media on Education and its EffectsSocial Media on Education and its Effects
Social Media on Education and its Effects
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
INTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTEINTERNET ETIQUETTE AND NETIQUETTE
INTERNET ETIQUETTE AND NETIQUETTE
 
Computer security
Computer securityComputer security
Computer security
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social Networking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 

Destacado

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
hafsan
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
Paul Berryman
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
charvill
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
haider ali
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
Samudin Kassan
 

Destacado (18)

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Internet privacy
Internet privacyInternet privacy
Internet privacy
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Audio&Video
Audio&VideoAudio&Video
Audio&Video
 
Ethics online
Ethics onlineEthics online
Ethics online
 
Online ethics
Online ethicsOnline ethics
Online ethics
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Bootstrap ppt
Bootstrap pptBootstrap ppt
Bootstrap ppt
 
How TOR works?
How TOR works?How TOR works?
How TOR works?
 
Responsive web-design through bootstrap
Responsive web-design through bootstrapResponsive web-design through bootstrap
Responsive web-design through bootstrap
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
jQuery PPT
jQuery PPTjQuery PPT
jQuery PPT
 

Similar a Internet privacy presentation

Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
Ashley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
JFashant
 
Effects of using I.C.T.
Effects of using I.C.T.Effects of using I.C.T.
Effects of using I.C.T.
ABUBAKAR270
 

Similar a Internet privacy presentation (20)

Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Password Management
Password ManagementPassword Management
Password Management
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
Social network and digital security
Social network and digital securitySocial network and digital security
Social network and digital security
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Do not track me
Do not track meDo not track me
Do not track me
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Effects of using I.C.T.
Effects of using I.C.T.Effects of using I.C.T.
Effects of using I.C.T.
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Último (20)

Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 

Internet privacy presentation

  • 1. GNED 190 INTERNET PRIVACY: IS INTERNET PRIVACY DEAD, OR IS IT STILL POSSIBLE TO PROTECT YOURSELF? By: Matthew Momney
  • 2. ADVANCING TECHNOLOGY With internet advancing as fast as it is, and the complexity of the tools to use it ever-growing, it is possible for the everyday user to maintain their own security on the web? How far does one have to delve into the underbelly of the world wide web to obtain the privacy they both want and deserve? The abusive capabilities that today’s browsers have and the speed at which they can be used is astounding.
  • 3. THE POTENTIAL RISKS The main issue with maintaining privacy on the internet is the fact that there are a number of different ways to access the information necessary to abuse or cause harm to an internet user. Whether it’s obtaining statistics and browsing information, or spreading spyware and viruses, the techniques available are almost effortless and do not take much experience to use.
  • 4. SOCIAL MEDIA One of the most common outlets for information about a user is using social media. These websites provide valuable information at the user’s own expense without necessarily meaning to. Privacy settings are often secondary and take some navigating to locate. Sites like Facebook.com for example have your privacy set to open as a default for new users. They do prompt you to set privacy settings, but operate them separately for each piece of content. You may have your main profile page set to be viewed by only people you have accepted as friends, however your profile pictures could be viewable.
  • 5. FACE RECOGNIZERS The frightening thing about social media sites being open about sharing information is the ability to use face recognizers to match your face with that of the pictures on your profiles. Experts were able to prove they could come up with social insurance numbers with just a web cam, a face recognizer, and an internet connection. Simple tasks that anyone with the tools can accomplish.
  • 6. FACE RECOGNIZERS CONT’D With this same technology identity thieves are using, legitimately run companies are gathering statistical information about their customers. By using the faces captured on their surveillance cameras and matching them to social media profiles, their personal information can be gathered and analyzed to better grasp their target audience.
  • 7. PUBLIC PHOTOGRAPHS Always an eerie thought is someone taking your photograph without you knowing. Even more creepy is the fact that it’s not against the law in any way if you’re in a public place. Anyone has the freedom to capture your face in anyway and alter the photo however they deem fit to post on the internet, and are only forced to remove the image from where they posted it if compliance is not received from the person in the photograph. Even after the photograph is removed, it can be a lengthy process with legal action to force the abuser to stop or international laws depending on where they are located. By that time the damage that the photograph can cause has already been done, and there’s no way to change the results.
  • 8. HTTP COOKIES The average user may know the browsers store them on their computer, but most do not know how HTTP cookies work. An HTTP cookie is a small piece of data sent from a website and stored on a user’s computer when they access said website. Unknowingly to the average internet user, cookies are very useful in tracking the user’s movements on the website, how frequently they view the pages, which pages they view the most, etc.
  • 9. HTTP COOKIES CONT’D The cookies are established to make internet browsing fast and enjoyable, by decreasing the time it would take to load a page you’ve previously been on, but there are malicious ways to abuse them. Tracking cookies allow web profiling, where the user’s browser history is obtained allowing them to get more personal information on the user who visited the websites.
  • 10. GOVERNMENT CONTROL When referring to government control, an overall access and censorship of the internet by the government to standards they deem fit. This method of censorship is used by the Chinese Government to restrict the internet users of their country from uploading any content they see as negative towards their country. The same type of idea was almost implemented in the United States with the Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) which was introduced to stop copyright infringement, but in the end would eliminate all of the user uploaded content and freedom the internet has to offer.
  • 11. STEPS TO SECURE YOURSELF: Passwords Securing your website accounts with strong passwords that would be difficult to guess or decode. Include capital and small caps, numbers, and even characters when available. Choose different passwords for each account so the security of each is just as tight. If one password is figured out, you would not want them to then be able to access all of your accounts.
  • 12. STEPS TO SECURE YOURSELF: Virus Protection It is paramount that you run a virus protection service on your computer. There are so many doorways viruses can come though, and it is not worth the risk not to be safe while connected to the internet. Many users have virus protection either preinstalled on the machine or purchased, but don’t run the automatic updates. Viruses are developed and updated just as fast as the virus protection software, so it is vital to maintain up-to-date protection software.
  • 13. STEPS TO SECURE YOURSELF: Google Yourself It sounds strange, but a simple google search of yourself to see what results come up is a good way to monitor your own privacy. There are ways to go about asking google to remove content from their search engine if you find it inappropriate or slanderous such as emails or forms in their privacy section of their site.
  • 14. STEPS TO SECURE YOURSELF: Limit the Content You Share It might seem redundant to say, but be careful what content you share on the internet. Information is the key to everything online, and one piece can lead to a treasure trove of your own personal identity. Keep your social media profiles tidy. Sweep the bad stuff under the rug so to speak and push the content out of sight with a flood of posts if they’re not possible to remove.
  • 16. OVERALL It is not impossible to protect yourself from the malicious content on the internet, but it does take some time and effort. Reading privacy policies, checking privacy settings, and keeping an eye on what content comes up in search engines about you. The best protection is not allowing anything at all, but limiting the amount of information you share, or using only one credit card for example will provide better control if anything does go wrong. Privacy is not dead, but you do have to bury your head in the ground to stay safe.
  • 17. DISCUSSION QUESTION What do you think? Is internet privacy dead or is it still possible to protect yourself?
  • 18. THANK YOU! Sources: • Steve Rambam, Privacy is Dead, Get Over It, https://www.youtube.com/watch?v=DaYn_PkrfvQ • Privacy issues of Social networking sites – http://www.isaca.org/Groups/Professional-English/security- trend/GroupDocuments/Social-Media-Wh-Paper-26-May10-Research.pdf • Discovered the article: Online photos can reveal our private data say experts - BBC NEWS - http://www.bbc.co.uk/news/technology-14386514 • Linked to from BBC NEWS: More Than Facial Recognition - Carnegie Mellon University - http://www.cmu.edu/homepage/society/2011/summer/facial-recognition.shtml