By Laith Qabbani Mohannad Al-Raie

Slides:



Advertisements
Similar presentations
Legal Obligations of Programmers Software Development Unit 4 Outcome 1.
Advertisements

Victoria ISD Common Sense Media Grade 6: Scams and schemes
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
What is identity theft, and how can you protect yourself from it?
INFORMATION REVELATION AND PRIVACY IN ONLINE SOCIAL NETWORKS (THE FACEBOOK CASE) Rachid Hamcha IMM.
Who Wants To Be A Safe Communicator? What does the ‘e’ stand for when it is in front of words? For example: , e-safety etc…
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Security Jonathan Calazan December 12, 2005.
Privacy By Mohammed Al-Ghamdi. Outline Introduction Privacy How to Provide Privacy Ethics Summary.
The Do’s and Don’ts of Online Communication
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Internet Ethics. Internet Ethics Cyberspace Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Using Social Networks to Harvest Addresses Reporter: Chia-Yi Lin Advisor: Chun-Ying Huang Mail: 9/14/
The Art of Networking Association for the Improvement of Minorities-IRS 45 th Annual Business Meeting and Training Seminar Darwin K Eldridge, Presenter.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Private and Personal Information Common Sense Unit l – Lesson 2 (Cross-Curricular Categories) Privacy and Security Information Literacy.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
 Introduction to Computing  Computer Programming  Terrorisom.
Ethics. Ethics are the principles and standards we use to decide how to act.
Introduction to Student Name Student Class.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Spam and the Ongoing Battle for the Inbox Joshua Goodman, Gordon Cormack, and David Heckerman Louis Szgalsky Andrew Burns.
Copyright © 2010 Pearson Education, Inc. publishing as Prentice HallChapter Finding, Evaluating, and Processing Information.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
1 Lecture 1: Introduction Outline course’s focus intruder’s capabilities motivation for security worms, viruses, etc. legal and patent issues.
Spam s By Jessica Romero CS-301. Spam s Spam s? Spam s? Is unsolicited and promotional sent to in bulk to multiple users.
Computer crimes.
What is it? Google Apps for Education is a suite of tools that allow you to produce documents, communicate, and collaborate with other people. Adams12.
Lesson 10: Ethical Issues. Whenever it is possible investigators should inform participants of the objectives of the investigation and get their consent.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Ethics of Research Ethics deal with a range of moral and immoral choices; Research challenges us to define individual moral principles; Academic researchers.
What is ?? A simple introduction. Ground mail You write a letter and mail it. It goes by truck, airplane, or boat. Mail goes to one special mailbox.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
Which Words or Phrases are Ambiguous?
Internet Safety Mrs. Blue 4 th -5 th Grade. Why do I need to learn about internet safety? Even though you can’t always see it, there are dangers that.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Who Wants To Be A Safe Communicator?
DIGITAL CITIZENSHIP What You Should Know!.
Cyberbullying BY LORD MUSHANGO.
Tor Good + Evil.
ITIS 1210 Introduction to Web-Based Information Systems
Internet Etiquette or Netiquette
The Do’s and Don’ts of Online Communication
Misc. Security Items.
Materials & Methods Introduction Abstract Results Conclusion
معلم الصف الثالث الابتدائي
Ethics Tutorial Assignment#2
Social Issues in Computing
ФОНД “СОЦИАЛНО ПОДПОМАГАНЕ”
Social Issues in Computing
KEEP SAFE I will NOT give out personal information: Name -- create a screen name Address Phone number Password School address Pictures.
Materials & Methods Introduction Abstract Results Conclusion
Materials & Methods Introduction Abstract Results Conclusion
Web Page Design and Development I Standards
Materials & Methods Introduction Abstract Results Conclusion
Materials & Methods Introduction Abstract Results Conclusion
Presentation transcript:

By Laith Qabbani Mohannad Al-Raie Privacy and Anonymity By Laith Qabbani Mohannad Al-Raie

Outline Introduction Email and cryptography Spam Email Ethics

Email and cryptography Analogy PGP (Pretty Good Privacy)

SPAM Who gets spam ? Slow down the network Purchase over the Internet E-mail address published Subscribed to a news service Participated in mailing lists Slow down the network

Email Ethics Denial (claim not to…) Disclosing someone else's email address for harm Misidentifying yourself Faking a mishap (If it's unethical in real life,it's unethical in email )

Email Ethics …Continue Misrepresenting a quote Pleading false confusion Intentional ambiguity Wandering eyes

Conclusion Any Question