Thinking about Privacy / security.

Slides:



Advertisements
Similar presentations
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Advertisements

Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
EDUC 260: Week 13 Hand-in your Position Paper. Overview Administrivia Ethics of computing in classrooms What did we learn in the course? Course evaluations.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Working group discussion 1 Cyber Risk Security, Privacy ?
Privacy By Mohammed Al-Ghamdi. Outline Introduction Privacy How to Provide Privacy Ethics Summary.
Privacy & Personal Information -- Why do we care or do we?
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
School of Computing. The Information Security Awareness Research Group.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Security and Ethics Privacy Employment Health Crime Working
Legal, Social, and Ethical Issues By Patt Angell.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Ethical Issues in Clinical Psychology
Ethical and Social...J.M.Kizza1 Module 9: Ethical and Social Issues in Cyberspace  Cyberspace Access  Intellectual Property Rights  Cyberspace Censorship.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Norman Security Suite User friendly premium security.
Zemana AntiLogger (2012) Zemana AntiLogger (2012) Zemana Antilogger has been specifically developed to protect PC from numerous security.
Kaspersky Small Office Security INTRODUCING New for 2014!
Copyright © 2012 Brooks/Cole, a division of Cengage Learning, Inc. CAREER COUNSELING: A HOLISTIC APPROACH Vernon G. Zunker Chapter 8.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
LOGO Technical English E-commerce. Logo Contents E-commerce companiesE-commerce featuresTransaction securityOnline transactions.
INTRODUCTION TO INFORMATION SYSTEMS LECTURE 11: SECURITY & ETHICAL CHALLENGES أ/ غدير عاشور
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Cyber Security A Hackers Perspective. Bryan Seely Hacker ( The good kind ) Author Chief Information Security Officer Professional Speaker.
Norton Antivirus Internet Security 2016
Securing Information Systems
Encryption with Keys and Passwords
Criminological psychology
CS 2315 review.
HOW TO UPDATE GUARDIAN ANTIVIRUS.  Guardian antivirus protects your pc from malware and provide protection against threads with multiple layers of security.
Career Counseling: A Holistic Approach
Comparing and Ordering Decimals Exit Slip
Security Of Information Systems
Hotspot Shield Protect Your Online Identity
Design for Security Pepper.
Secure Software Confidentiality Integrity Data Security Authentication
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Call on How Can Be Fix to Norton Product Error 8504, 104?
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
COMPUTER PRIVACY.
AVG Antivirus Customer Care Number
Information Security It Is Your Business
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
IT & Security Training Skills.
Unit 4: Lesson 6: Encryption With Keys and Passwords
Encryption and Hacking
Cyber Security Trends and Challenges
Welcome to eScan 11.
Cybersecurity: Tried and True Tactics for Assessing and Managing Risks, Employee Training and Program Testing Brian Rubin, Partner, Sutherland Tee Meeks,
ETHICAL PRINCIPLES IN RECORD KEEPING
Chapter # 3 COMPUTER AND INTERNET CRIME
Protection of Privacy Online CAIGF2017-Dushanbe, Tajikistan
 McAfee antivirus offers protection to your important documents and secures your files and folder on the device. It is the most famous antivirus for.
IoT: Privacy and Security
World-Leading Research with Real-World Impact!
Privacy, Security, and Ethics
The RC4 Algorithm Network Security.
Session 1 – Introduction to Information Security
INTERNET SECURITY.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
McAfee.com/activate. Mcafee Activate
Presentation transcript:

Thinking about Privacy / security

The next 15 minutes Professional | Personal Private | Public Closed| Open Secure | Insecure

Professional ethics vs. personal Values

Private Property rights

Disclosure Consent The word

SNAP Subsidized housing Social Security Admission?

The poor divorce with Their feet

Public Broadcast

My heart on your sleeve? confidence

culture What does privacy mean? http://www.in-mind.org/blog/post/the-cross-cultural-psychology-of-internet-privacy-concern https://www8.gsb.columbia.edu/researcharchive/articles/1172

Security Information | Data

What Who How Assess

Retardant firewall https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html

Cipher Key encryption https://en.wikipedia.org/wiki/Encryption

redundancy The good kind of https://en.wikipedia.org/wiki/Redundancy_(engineering)

Defend Antivirus Antimalware Good judgment http://cyberworldmirror.com/cyber-security-15-simple-steps-to-protect-your-self-against-cyber-attacks/

Passwords A few remarks about http://www.npr.org/sections/alltechconsidered/2017/08/14/543434808/forget-tough-passwords-new-guidelines-make-it-simple https://www.wired.com/2016/01/you-need-a-password-manager/

Qs? tross@illinoislegalaid.org