UNIT 4 – Identifying People With Data

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
SECURITY CHECK Protecting Your System and Yourself Source:
What is identity theft, and how can you protect yourself from it?
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topics: What precautions should I take? Name:
CCT355H5 F Presentation: Phishing November Jennifer Li.
Personal Privacy and the Public Internet John E. Carter Kennesaw State University IT 3700.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
COOKIES AND SESSIONS.
Safe Computing Practices. What is behind a cyber attack? 1.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Online Reputation A guide for children aged 7+
AP CSP: Cybercrime.
Protecting Your Assets By Preventing Identity Theft
INTERNET SAFETY FOR EVERYONE
AP CSP: Identifying People with Data and The Cost of Free
Making card acceptance work for you
Mrs. Esman Computer Special
Creating your online identity
MEDIA LITERACY Isabelle M.
JavaScript/ App Lab Programming:
Scams & Schemes Common Sense Media.
Day 34- Identifying People With Data The Cost of Free
UNIT 2 – CHAPTER 1 – LESSON 1 DIGITAL INFORMATION.
Digital Citizenship Middle School
The Cost of Free Lesson 4-4.
ISYM 540 Current Topics in Information System Management
How do we buy and sell on the Internet safely?
UNIT 2 – LESSON 6 ENCODE AN EXPERIENCE.
Identifying People With Data
Identifying the Risks.
Chapter 5 Electronic Commerce | Security
Making card acceptance work for you
UNIT 4 – THE COST OF FREE LESSON 4.
Check Your Assumptions
The Need for Programming Languages
Difficult Cases for the Market, and the Role of Government
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
UNIT 2 – CHAPTER 2 – LESSON 7 Introduction to Data.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Five Unethical Uses of Computers
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Cyber Issues Facing Medical Practice Managers

Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Be Safe, Be Seen, Be Secure
Chapter 5 Electronic Commerce | Security
Lesson 16: Functions with Return Values
Cybersecurity and Personal Finance
***SIT WITH PRESENTATION PARTNERS***
DAY 1 - Explore - AP Performance Task Prep
Internet Safety for Everyone
Finding Trends with Visualizations
UNIT 4 – THE COST OF FREE LESSON 6.
Cookies and sessions Saturday, February 23, 2019Saturday, February 23,
UNIT 4 – Identifying People With Data
Rapid Research - Format Showdown
Internet Safety for Everyone
Digital Footprint Audrey Larocque.
What’s the Big Deal About Internet Privacy?
Personal Privacy and the Public Internet
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

UNIT 4 – Identifying People With Data LESSON 3

While there are many potential benefits associated with the collection and analysis of large amounts of data, these advances pose a constant risk to our collective security and privacy. 

Large-scale data breaches mean that the details of our personal, professional, and financial lives may be at risk. 

To prevent personal data from being linked to an individual person, personally identifying information, such as name, address, or identification number, is often removed from publicly available data.

 Nevertheless, through the use of computational analysis, it is often possible to “re-identify” individuals within data, based on seemingly innocuous information. As more of our lives is digitized, questions of security and privacy become ever more prevalent.

Look at the World's Biggest Data Breaches Visualization - Web Site (link in code studio) What kind of data is being lost? And how much? What kinds of issues could arise from this data getting into the wrong hands?  

All kinds of personal data, from usernames to social security numbers and credit card information, is lost fairly regularly. This information can be used to steal money or identities, get access to classified information, blackmail people, etc.

We’ve spent a lot of time looking at potential benefits of collecting and analyzing data. As we’ve already seen today, however, there are some risks associated with collecting all of this information. If it falls into the wrong hands or is used in ways we didn’t intend, there may be serious risks imposed on our privacy or security. We’re going to start looking more deeply at this problem.

In the data breaches we just looked at, some fairly important pieces of information were stolen. Credit card numbers, passport information, or government security clearances are obviously not something we’d like to fall into the wrong hands. Other pieces of information, however, don’t seem that bad. So what if people know your ZIP code? So what if people know your birthday? This is information we usually share without a second thought.

Look at the Data Privacy Lab - Web Site (10 min) Type in your information (birthday, ZIP code, and gender) to determine how many other people share those characteristics.

Why is it significant that you are one of only a few people with your birthday, gender, and ZIP code? What concerns does this raise?

We can be uniquely identified from just a few pieces of information We can be uniquely identified from just a few pieces of information. Even information we would not normally consider to be “sensitive” can still be used to identify us. There are security and privacy concerns raised as a result of most information about us being available online.

Distribute: Activity Guide - Research Yourself - Activity Guide.

TURN IN: ACTIVITY GUIDE: RESEARCH YOURSELF You have homework today TURN IN: ACTIVITY GUIDE: RESEARCH YOURSELF You have homework today!! “Blown to Bits” can be found on my website. All of Chapter 2 is an interesting read – the HW is on 32 - 42