1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.
CSCI-235 Micro-Computer in Science Privacy & Security.
Confidentiality and Privacy Controls
Chapter 9: Privacy, Crime, and Security
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Chapter 17 Controls and Security Measures
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter 9 1.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
Computers Are Your Future
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Cryptography, Authentication and Digital Signatures
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Legal Environment for a New Century. Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Privacy, Security and Ethics
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
CSCI-235 Micro-Computers in Science Privacy & Security.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
CSCI-235 Micro-Computer Applications Privacy & Security I.
Security, Social and Legal Issues Regarding Software and Internet
Security, Social and Legal Issues Regarding Software and Internet
Chapter 10 Cyberlaw, Social Media, and Privacy
Crypto in information security
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
E-Commerce Security.
Cybersecurity Awareness
Wiretapping and Encryption
Who Uses Encryption? Module 7 Section 3.
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Chapter 5 Electronic Commerce | Security
PowerPoint® Slides to Accompany
Confidentiality and Privacy Controls
Chapter 10: Privacy, Security, and Ethics
HOW DO I KEEP MY COMPUTER SAFE?
Public-Key, Digital Signatures, Management, Security
Computer Security.
Computer Security.
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel

Copyright © 2003 Prentice Hall, Inc 2 Tips for using the slide show Use MS Power Point XP to view the presentation. Earlier versions will not show the animations correctly. Slides with : Click the slide to view all of its sections and animations. Some slides need to be clicked several times. will appear once the last object on the slide has appeared. Click to go to the next slide. represents an Internet link that will take you to the Web site when you click on it. Internet connection required. Clicking on the or icon will take you to the previous or the next slide. Slides with videos or sounds: Click on the picture to view videos or listen to sounds. NEXT SLIDE I NEXT SLIDE Copyright © 2003 Prentice Hall, Inc

3 Chapter 12 Privacy and Encryption COMPUTERS IN YOUR FUTURE 2004 COMPUTERS IN YOUR FUTURE 2004 by Bryan Pfaffenberger and Bill Daley Chapter 12 Privacy and Encryption What You Will Learn NEXT SLIDE The threat of privacy due to the sale of sensitive personal information on the Internet Definition of anonymity and how it is abused by users Technological developments and how they are eroding privacy and anonymity Reasons why employers are monitoring employees’ computer usage How public-key encryption threatens U.S. security, both foreign and domestic The U.S. government’s proposed key recovery plan and how it threatens the growth of Internet commerce

Copyright © 2003 Prentice Hall, Inc 4 NEXT SLIDE Identity Theft Identity theft is one of the fastest growing crimes in the United States and Canada. Identity theft occurs when enough information about an individual is obtained to open a credit card account in their name and charge items to that account. Examples of information needed are name, address, social security number, and other personal information. Laws limit liability to $50 for each fraudulent charge. An individual’s credit report is affected by identity theft.

Copyright © 2003 Prentice Hall, Inc 5 NEXT SLIDE Privacy in Cyberspace Privacy refers to an individual’s ability to restrict the collection, use, and sale of confidential personal information. The Internet is eroding privacy through the selling of information collected through registration forms on Web sites. Few laws regulate selling personal information. Technology is not only making it easier to invade someone’s privacy, but it is also providing a means to protect against privacy invasion.

Copyright © 2003 Prentice Hall, Inc 6 NEXT SLIDE Encryption Encryption refers to the coding of information so that it is only readable by the intended recipient. It is used in electronic commerce transactions and . Encryption provides a way to use the Internet in a safe, secure way. It could be used misused by criminals and terrorists.

Copyright © 2003 Prentice Hall, Inc 7 NEXT SLIDE Anonymity Anonymity is the ability to convey a message without disclosing one’s identity. It can be abused because it frees people from accountability. Defamation is the act of injuring someone’s reputation by making false statements. Libel occurs when malicious statements are made in writing.

Copyright © 2003 Prentice Hall, Inc 8 NEXT SLIDE How Is Technology Eroding Privacy and Anonymity? Computers and the Internet enable marketing firms, snoops, and government officials to collect information in ways that are hidden from view. Hidden information technologies used on the Internet are:  Cookies  Global Unique Identifiers (GUIDs)

Copyright © 2003 Prentice Hall, Inc 9 NEXT SLIDE Cookies Cookies are small files that are written to an individual’s hard drive whenever a Web site is visited. Legitimate purposes of cookies include recording information for future use. Example: retail sites using “shopping carts.” Questionable practices include banner ad companies tracking a user’s browsing actions and placing banner ads on Web sites based on those actions.

Copyright © 2003 Prentice Hall, Inc 10 NEXT SLIDE Example of Cookies

Copyright © 2003 Prentice Hall, Inc 11 NEXT SLIDE Global Unique Identifiers (GUIDs) A GUID is a unique identification number generated by hardware or a program. It is used to send user information back to the site that created it.

Copyright © 2003 Prentice Hall, Inc 12 NEXT SLIDE Protecting Your Privacy Online 1.Browse anonymously– Use Web sites such as or Disable cookies on your Web browser. 3.Use free addresses for information placed on Web sites. 4.Don’t divulge personal information to online strangers. 5.Make sure registration forms have a privacy policy statement.

Copyright © 2003 Prentice Hall, Inc 13 NEXT SLIDE Privacy at Work Employees are given and Internet access at work. Companies are concerned about employees’ wasting time surfing the net and sending personal . Three-quarters of large corporations monitor employees’ phone calls, , Web browsing habits, and computer files. Laws do not protect employees from being monitored.

Copyright © 2003 Prentice Hall, Inc 14 NEXT SLIDE Things to Remember at Work 1.Do not use the employer’s phone for personal calls. 2.Do not use the employer’s for personal messages. 3.Assume everything you do at work is being monitored.

Copyright © 2003 Prentice Hall, Inc 15 NEXT SLIDE Encryption Basics A readable message is called plaintext. An encryption key is a formula used to make plaintext unreadable. The coded message is called ciphertext. An encryption technique called rot-13 is used in chat rooms and Usenet discussions. Symmetric key encryption algorithms are encryption techniques that use the same key to encrypt and decrypt a message. Data Encryption Standard (DES) is a commonly used encryption system.

Copyright © 2003 Prentice Hall, Inc 16 The Problem of Key Interception Rot-13 is not a secure encryption system. Symmetric key encryption systems are vulnerable to key interception, or having their key stolen. Banks and military agencies use a complex encryption system called strong encryption. NEXT SLIDE

Copyright © 2003 Prentice Hall, Inc 17 NEXT SLIDE Public Key Encryption Public key encryption uses two different keys.  Public key is the encryption key.  Private key is the decryption key. They are used in e-commerce transactions. A secure channel for information is provided when the keys are used. The encryption keys are computationally intensive, they place a heavy burden on the CPU. They are vulnerable to cryptanalysis, or code breaking. Key length is the length (in bits) of an encryption key.

Copyright © 2003 Prentice Hall, Inc 18 Public Key Encryption Algorithms Numerous public key encryption algorithms have been developed.  Diffie-Hellman algorithm  RSA encryption algorithm  Fortezza NEXT SLIDE

Copyright © 2003 Prentice Hall, Inc 19 Digital Signatures and Certificates Digital signatures are a technique used to guarantee that a message has not been tampered with. Digital certificates are a technique used to validate one’s identity. Digital signatures are used with non-encrypted and encrypted messages. A hash key, a mathematical value, is used to describe the message’s content. Digital certificates can be obtained from a certificate authority (CA). NEXT SLIDE

Copyright © 2003 Prentice Hall, Inc 20 Public Key Infrastructure (PKI) A public key infrastructure is a uniform set of encryption standards that specify how public key encryption, digital signatures, and digital certificates should be implemented. NEXT SLIDE

Copyright © 2003 Prentice Hall, Inc 21 NEXT SLIDE Public Security Issues of Strong Encryption Encryption can be used for illegal means as well as legitimate means. Encryption will devastate law enforcement’s ability to fight crime. Public key encryption can also be used in telephone conversations. Law enforcement agencies are asking for laws enabling them to eavesdrop on encrypted messages.  Clipper Chip  Key escrow plan  Key recovery

Copyright © 2003 Prentice Hall, Inc 22 The Academic Angle U.S cryptographic researchers lead the world in cryptography. Companies are pressuring the researchers to not publish their research. Copyright management infrastructures (CMIs) enable vendors of digital media to track and control the use and copying of their products. The Digital Millennium Copyright Act (DMCA) imposes stiff penalties for anyone divulging information about how CMI works. NEXT SLIDE

Copyright © 2003 Prentice Hall, Inc 23 NEXT SLIDE Chapter 12 Summary 1.Sensitive personal information is for sale on the Internet. 2.Web sites collect personal information without informing their visitors. 3.Anonymity is the ability to convey a message without disclosing one’s identity. 4.Cookies provide a way for Web sites to record one’s browsing activities. 5.GUIDs make anonymous usage of the Internet difficult. 6.Many employers monitor their employees phone calls, , Web browsing habits, and computer files. 1.Sensitive personal information is for sale on the Internet. 2.Web sites collect personal information without informing their visitors. 3.Anonymity is the ability to convey a message without disclosing one’s identity. 4.Cookies provide a way for Web sites to record one’s browsing activities. 5.GUIDs make anonymous usage of the Internet difficult. 6.Many employers monitor their employees phone calls, , Web browsing habits, and computer files.

Copyright © 2003 Prentice Hall, Inc 24 NEXT SLIDE Chapter 12 Summary cont. 7.Public key encryption uses an encryption key and a decryption key. 8.Security agencies fear that public key encryption will prevent them from detecting illegal activities. 9.The longer the key length, the stronger the encryption. 10.A public key infrastructure is a set of uniform encryption standards. 7.Public key encryption uses an encryption key and a decryption key. 8.Security agencies fear that public key encryption will prevent them from detecting illegal activities. 9.The longer the key length, the stronger the encryption. 10.A public key infrastructure is a set of uniform encryption standards.

Copyright © 2003 Prentice Hall, Inc 25 THE END