SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
1




Arab Academy for Science &Technology & Maritime Transport
College of Computing and Information Technology
2




• Marke&ng	
  database:	
  Collec&on	
  of	
  data	
  about	
  people,	
  used	
  
  for	
  marke&ng	
  purposes	
  
   • Data	
  obtained	
  through	
  online	
  and	
  offline	
  purchases,	
  
     public	
  informa&on,	
  etc.	
  
   • Beginning	
  to	
  be	
  used	
  in	
  conjunc&on	
  with	
  Web	
  ac&vi&es	
  
• Government	
  database:	
  Collec&on	
  of	
  data	
  about	
  people,	
  
  collected	
  and	
  maintained	
  by	
  the	
  government	
  
   • Tax	
  informa&on,	
  Social	
  Security	
  earnings,	
  personal	
  health	
  
     records,	
  marriage	
  and	
  divorce	
  informa&on	
  
   • Some	
  informa&on	
  is	
  confiden&al,	
  other	
  is	
  public	
  
3




• Electronic	
  profiling	
  
  • Using	
  electronic	
  means	
  to	
  collect	
  a	
  variety	
  of	
  in-­‐depth	
  
    informa&on	
  about	
  an	
  individual	
  
4
5
6




• Safeguard	
  your	
  e-­‐mail	
  address	
  
  • Use	
  a	
  throw-­‐away	
  e-­‐mail	
  address	
  (an	
  extra	
  e-­‐mail	
  address	
  
    that	
  you	
  can	
  use	
  for	
  	
  ac&vi&es	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
    that	
  might	
  result	
  in	
  	
  spam)	
  
     • Get	
  a	
  second	
  e-­‐mail	
  address	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
       from	
  your	
  ISP	
  or	
  from	
  Hotmail,	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
       Yahoo!	
  Mail,	
  or	
  Gmail	
  
     • Can	
  stop	
  using	
  it	
  	
  
       and	
  get	
  a	
  new	
  one	
  	
  
       when	
  needed	
  
7




• Be	
  cau&ous	
  of	
  revealing	
  
 personal	
  	
  informa&on	
  
  • Read	
  a	
  Web	
  site’s	
  privacy	
  
    policy	
  
  • Can	
  use	
  privacy	
  soSware,	
  
    such	
  as	
  the	
  free	
  Privacy	
  
    Bird	
  program	
  
  • Do	
  not	
  supply	
  personal	
  
    informa&on	
  to	
  people	
  in	
  
    chat	
  rooms	
  	
  
8
9




An	
  anonymizer	
  or	
  an	
  anonymous	
  proxy	
  is	
  a	
  tool	
  that	
  
aUempts	
  to	
  make	
  ac&vity	
  on	
  the	
  untraceable.	
  	
  
It	
  is	
  a	
  proxy	
  server	
  computer	
  that	
  acts	
  as	
  an	
  intermediary	
  
and	
  privacy	
  shield	
  between	
  a	
  client	
  computer	
  and	
  the	
  rest	
  
of	
  the	
  Internet.	
  	
  
It	
  accesses	
  the	
  Internet	
  on	
  the	
  user's	
  behalf,	
  protec&ng	
  
personal	
  informa&on	
  by	
  hiding	
  the	
  client	
  computer's	
  
iden&fying	
  informa&on	
  	
  
10




• Be	
  cau&ous	
  of	
  revealing	
  personal	
  	
  informa&on	
  
  • Read	
  a	
  Web	
  site’s	
  privacy	
  policy	
  
  • Avoid	
  puWng	
  too	
  many	
  personal	
  details	
  on	
  your	
  Web	
  site	
  
  • Be	
  wary	
  of	
  sites	
  offering	
  prizes	
  in	
  exchange	
  for	
  personal	
  
    informa&on	
  
  • Consider	
  using	
  privacy	
  soSware,	
  such	
  as	
  anonymous	
  
    surfing	
  
  • Supply	
  only	
  the	
  required	
  informa&on	
  in	
  registra&on	
  forms	
  
  • Delete	
  your	
  browsing	
  history	
  and	
  e-­‐mail	
  seWngs	
  when	
  
    using	
  a	
  public	
  computer	
  
11




• Use	
  an	
  e-­‐mail	
  filter	
  to	
  automa&cally	
  route	
  possible	
  spam	
  
 into	
  a	
  special	
  folder	
  to	
  deal	
  with	
  later	
  
12




• Web	
  servers	
  holding	
  sensi&ve	
  data	
  should	
  be	
  secured	
  
  • Only	
  enter	
  personal	
  informa&on	
  on	
  Web	
  sites	
  using	
  
    secure	
  servers	
  	
  
  • Automa&c	
  encryp&on	
  systems	
  for	
  e-­‐mail	
  can	
  help	
  
    sensi&ve	
  data	
  from	
  accidentally	
  being	
  revealed	
  
13




• Properly	
  dispose	
  of	
  hardware	
  
 and	
  outdated	
  data	
  
  • Wipe	
  (not	
  just	
  delete)	
  data	
  
    on	
  hard	
  drives	
  before	
  	
  
    disposing	
  of	
  a	
  computer	
  or	
  
    hard	
  drive	
  
  • Storage	
  media	
  containing	
  
    sensi&ve	
  data	
  should	
  be	
  
    shredded	
  
  • Businesses	
  should	
  have	
  a	
  
    media	
  sanita&on/data	
  
    destruc&on	
  policy	
  
14
15
16
17
18
19




• Difficult	
  for	
  legal	
  system	
  to	
  keep	
  pace	
  with	
  technology	
  
• Difficult	
  to	
  balance	
  freedom	
  of	
  speech	
  with	
  privacy	
  

Más contenido relacionado

La actualidad más candente

Security is a Culture GB v 9
Security is  a Culture GB v 9Security is  a Culture GB v 9
Security is a Culture GB v 9
Garry Bolland
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
mcgilla
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
jamiehaworth1
 

La actualidad más candente (20)

Security is a Culture GB v 9
Security is  a Culture GB v 9Security is  a Culture GB v 9
Security is a Culture GB v 9
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
What Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika BhatiaWhat Is Internet made by Ms. Archika Bhatia
What Is Internet made by Ms. Archika Bhatia
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
IP and ICT - Intro
IP and ICT - IntroIP and ICT - Intro
IP and ICT - Intro
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Internet
InternetInternet
Internet
 
Ethics and legislation in the it industry
Ethics and legislation in the it industryEthics and legislation in the it industry
Ethics and legislation in the it industry
 
Web Browsing and Internet Communication
Web Browsing and Internet Communication Web Browsing and Internet Communication
Web Browsing and Internet Communication
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
ITFT - Web security
ITFT - Web securityITFT - Web security
ITFT - Web security
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
eng_hw
eng_hweng_hw
eng_hw
 
Privacy
PrivacyPrivacy
Privacy
 
Internet
InternetInternet
Internet
 
Internet Security is an Oxymoron
Internet Security is an OxymoronInternet Security is an Oxymoron
Internet Security is an Oxymoron
 
Digital law
Digital lawDigital law
Digital law
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Destacado

Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 q
Ramy Eltarras
 
Lect 09 processing and memory dr (1)
Lect 09 processing and memory dr (1)Lect 09 processing and memory dr (1)
Lect 09 processing and memory dr (1)
Ramy Eltarras
 
Lec 04 program development and programming languages
Lec 04 program development and programming languagesLec 04 program development and programming languages
Lec 04 program development and programming languages
Ramy Eltarras
 
Sample mobile Pages created on Qryptal
Sample mobile Pages created on QryptalSample mobile Pages created on Qryptal
Sample mobile Pages created on Qryptal
Qryptal
 
Lect 05 computer networks 1 m 2012 dr
Lect 05 computer networks 1 m 2012 drLect 05 computer networks 1 m 2012 dr
Lect 05 computer networks 1 m 2012 dr
Ramy Eltarras
 
H3 sk pulsar_ba_voplus_deel2_1_4_metalen
H3 sk pulsar_ba_voplus_deel2_1_4_metalenH3 sk pulsar_ba_voplus_deel2_1_4_metalen
H3 sk pulsar_ba_voplus_deel2_1_4_metalen
HPA Schouwenaars
 
Presentation: Food and drink
Presentation: Food and drinkPresentation: Food and drink
Presentation: Food and drink
mapaiju
 

Destacado (20)

Lect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 qLect 07 computer security and privacy 1 4 q
Lect 07 computer security and privacy 1 4 q
 
Lect 09 processing and memory dr (1)
Lect 09 processing and memory dr (1)Lect 09 processing and memory dr (1)
Lect 09 processing and memory dr (1)
 
Lec 04 program development and programming languages
Lec 04 program development and programming languagesLec 04 program development and programming languages
Lec 04 program development and programming languages
 
Multigenerational workforce -rewarding them study
Multigenerational workforce -rewarding them studyMultigenerational workforce -rewarding them study
Multigenerational workforce -rewarding them study
 
Hunter bates
Hunter batesHunter bates
Hunter bates
 
John hickman
John hickmanJohn hickman
John hickman
 
Sample mobile Pages created on Qryptal
Sample mobile Pages created on QryptalSample mobile Pages created on Qryptal
Sample mobile Pages created on Qryptal
 
Klout: The Good, the Bad and the Ugly
Klout: The Good, the Bad and the UglyKlout: The Good, the Bad and the Ugly
Klout: The Good, the Bad and the Ugly
 
Lect 05 computer networks 1 m 2012 dr
Lect 05 computer networks 1 m 2012 drLect 05 computer networks 1 m 2012 dr
Lect 05 computer networks 1 m 2012 dr
 
H3 sk pulsar_ba_voplus_deel2_1_4_metalen
H3 sk pulsar_ba_voplus_deel2_1_4_metalenH3 sk pulsar_ba_voplus_deel2_1_4_metalen
H3 sk pulsar_ba_voplus_deel2_1_4_metalen
 
Serving the Multigenerational Workforce
Serving the Multigenerational WorkforceServing the Multigenerational Workforce
Serving the Multigenerational Workforce
 
Presentation: Food and drink
Presentation: Food and drinkPresentation: Food and drink
Presentation: Food and drink
 
Team b ethics scrapbook project_wk5
Team b ethics scrapbook project_wk5Team b ethics scrapbook project_wk5
Team b ethics scrapbook project_wk5
 
Engaging Through Community: Using Social Media for Wellness and Benefits Comm...
Engaging Through Community: Using Social Media for Wellness and Benefits Comm...Engaging Through Community: Using Social Media for Wellness and Benefits Comm...
Engaging Through Community: Using Social Media for Wellness and Benefits Comm...
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 
Primaria 4-junio-sesion
Primaria 4-junio-sesionPrimaria 4-junio-sesion
Primaria 4-junio-sesion
 
Introduction to Google Drive API
Introduction to Google Drive APIIntroduction to Google Drive API
Introduction to Google Drive API
 
Uc14 chap15
Uc14 chap15Uc14 chap15
Uc14 chap15
 
Network standards & protocols
Network standards & protocolsNetwork standards & protocols
Network standards & protocols
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 

Similar a Lect 08 computer security and privacy 2 4 q

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
Radiant Minds
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
Darren McManus
 
Bcc comp4 ppt1
Bcc comp4 ppt1Bcc comp4 ppt1
Bcc comp4 ppt1
ifrieshe
 
MS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics AssignmentMS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics Assignment
Darren McManus
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
CRM
 

Similar a Lect 08 computer security and privacy 2 4 q (20)

001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
 
Bcc comp4 ppt1
Bcc comp4 ppt1Bcc comp4 ppt1
Bcc comp4 ppt1
 
MS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics AssignmentMS810 Information Security and Ethics Assignment
MS810 Information Security and Ethics Assignment
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
L50 slides
L50 slidesL50 slides
L50 slides
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Judy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 PresentationJudy Taylour's Digital Privacy Day 2014 Presentation
Judy Taylour's Digital Privacy Day 2014 Presentation
 
Ethics and safety measures in Computing
Ethics and safety measures in ComputingEthics and safety measures in Computing
Ethics and safety measures in Computing
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Secure Communication
Secure CommunicationSecure Communication
Secure Communication
 

Lect 08 computer security and privacy 2 4 q

  • 1. 1 Arab Academy for Science &Technology & Maritime Transport College of Computing and Information Technology
  • 2. 2 • Marke&ng  database:  Collec&on  of  data  about  people,  used   for  marke&ng  purposes   • Data  obtained  through  online  and  offline  purchases,   public  informa&on,  etc.   • Beginning  to  be  used  in  conjunc&on  with  Web  ac&vi&es   • Government  database:  Collec&on  of  data  about  people,   collected  and  maintained  by  the  government   • Tax  informa&on,  Social  Security  earnings,  personal  health   records,  marriage  and  divorce  informa&on   • Some  informa&on  is  confiden&al,  other  is  public  
  • 3. 3 • Electronic  profiling   • Using  electronic  means  to  collect  a  variety  of  in-­‐depth   informa&on  about  an  individual  
  • 4. 4
  • 5. 5
  • 6. 6 • Safeguard  your  e-­‐mail  address   • Use  a  throw-­‐away  e-­‐mail  address  (an  extra  e-­‐mail  address   that  you  can  use  for    ac&vi&es                                                                                           that  might  result  in    spam)   • Get  a  second  e-­‐mail  address                                                                                               from  your  ISP  or  from  Hotmail,                                                                                                 Yahoo!  Mail,  or  Gmail   • Can  stop  using  it     and  get  a  new  one     when  needed  
  • 7. 7 • Be  cau&ous  of  revealing   personal    informa&on   • Read  a  Web  site’s  privacy   policy   • Can  use  privacy  soSware,   such  as  the  free  Privacy   Bird  program   • Do  not  supply  personal   informa&on  to  people  in   chat  rooms    
  • 8. 8
  • 9. 9 An  anonymizer  or  an  anonymous  proxy  is  a  tool  that   aUempts  to  make  ac&vity  on  the  untraceable.     It  is  a  proxy  server  computer  that  acts  as  an  intermediary   and  privacy  shield  between  a  client  computer  and  the  rest   of  the  Internet.     It  accesses  the  Internet  on  the  user's  behalf,  protec&ng   personal  informa&on  by  hiding  the  client  computer's   iden&fying  informa&on    
  • 10. 10 • Be  cau&ous  of  revealing  personal    informa&on   • Read  a  Web  site’s  privacy  policy   • Avoid  puWng  too  many  personal  details  on  your  Web  site   • Be  wary  of  sites  offering  prizes  in  exchange  for  personal   informa&on   • Consider  using  privacy  soSware,  such  as  anonymous   surfing   • Supply  only  the  required  informa&on  in  registra&on  forms   • Delete  your  browsing  history  and  e-­‐mail  seWngs  when   using  a  public  computer  
  • 11. 11 • Use  an  e-­‐mail  filter  to  automa&cally  route  possible  spam   into  a  special  folder  to  deal  with  later  
  • 12. 12 • Web  servers  holding  sensi&ve  data  should  be  secured   • Only  enter  personal  informa&on  on  Web  sites  using   secure  servers     • Automa&c  encryp&on  systems  for  e-­‐mail  can  help   sensi&ve  data  from  accidentally  being  revealed  
  • 13. 13 • Properly  dispose  of  hardware   and  outdated  data   • Wipe  (not  just  delete)  data   on  hard  drives  before     disposing  of  a  computer  or   hard  drive   • Storage  media  containing   sensi&ve  data  should  be   shredded   • Businesses  should  have  a   media  sanita&on/data   destruc&on  policy  
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19 • Difficult  for  legal  system  to  keep  pace  with  technology   • Difficult  to  balance  freedom  of  speech  with  privacy