Privacy Aziz Doumith Michael Kot Luis Pacheco Emory Petermann Wyatt Pierson Henry Stigler.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

The Internet and the Web
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Assessing Privacy Risks of Flash Cookies Kevin Fuller and Stacy Jordan February.
How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Chapter 11 Privacy Policies and Behavioral Marketing.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
© 2012 Microsoft Corporation. All rights reserved. Amazing apps. Windows 8 comes with built-in apps for the things you do most to help get your favorite.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
How It Applies In A Virtual World
Behavior Tracking Dhaval Patel.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crimes.
Surveillance Equipment For Internet Activities It is a Internet activities surveillance equipment designed for sniffer package from networking, converter.
Chapter 16 The World Wide Web Chapter Goals ( ) Compare and contrast the Internet and the World Wide Web Describe general Web processing.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
PRIVACY BOOTCAMP YpJU.
 Facebook  Twitter  MySpace  Windows LiveSpace.
The Internet Industry Week Four. RISE OF THE INTERNET THE INTERNET – a global system of interconnected private, public, academic, business, and government.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Use of Electronic and Internet advertising options Standard 3.4.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Regulation of Personal Information Sally Brierley & Emma Harvey.
By Elijah Redding CIS 150. A New Kind of Ad: Customized to Your Interests With the internet being one of the top choices for advertising, marketers are.
The Internet CSC September 30, History of the Internet Developed for secure military communications Evolved from Advanced Research Projects.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Privacy and Data Mining What Do “They” Know About You?
Restoring Privacy, Cleaning Your Computer's Cookies and Beacons.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
Facebook privacy policy
Personal spaces.
The Internet Industry Week Two.
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Latest Updates on BlackHawk Mines Music : Privacy Policy
Application of the Internet
Search Engine comparison
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Use of Electronic and Internet advertising options
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
HOW DO I KEEP MY COMPUTER SAFE?
Unit# 5: Internet and Worldwide Web
E-commerce Infrastructure Web Servers / Web Clients / Web Browsers
CYBERSAFETY & Personal information
Privacy and Data Mining
Privacy and Data Mining
The Internet and Electronic mail
Presentation transcript:

Privacy Aziz Doumith Michael Kot Luis Pacheco Emory Petermann Wyatt Pierson Henry Stigler

Privacy The Internet: - Enables us to improve communication - Removes physical barriers - Greatly absorbed into our society and touches nearly every part of our lives You may assume that the same laws or societal rules that protect your privacy in the physical world apply to the digital world as well. But the Internet remains largely unregulated and the policies governing it underdeveloped.

How Personal Information is revealed through Internet Activities -Signing up for Internet Service - -Browsing the Internet -Search Engines -Cookies/Flash Cookies -Browsers -Interactive Use -Instant Messages -Social Networks -Personal Websites -Managing your financial accounts and online bill payments

ISPs Internet Service Providers (ISPs) – Allow you to connect your computer to the Internet. -Internet Protocol (IP) Address -Does not provide personally identifiable information -However, ISPs know your IP address and is a weak link when it comes to protecting your privacy. -For example, if your father owns an ISP he can know every thing you do on the internet!

- When you send an the recipient can send it to anybody they desire. -Laws distinguish between messages in transit and stored messages, the latter getting less protection. -Exceptions to s in transit: -ISP can view s if suspects damage to system or other users -Employers can view in s sent from a business location -Government can access records about online activity without Court Orders after 9/11

Browsers -Being on the internet means relaying personal information to websites -Browsers provides IP Address and information of past websites visited to Web Site Operators - -Allow users to control how much information is stored. -Research shows that “Private Browsing” fails to purge all traces of online activity.

Cookies/Flash Cookies -Information entered on websites stored on hard drive. -Login or registration info, preferences, “shopping cart” info, etc. -Third-party cookies communicate data about you to advertising companies which are further shared with other marketers. -Flash-cookies are harder to get rid of and cannot be erased simply by doing so in your browser. -Myspace, ABC, ESPN, Hulu, MTV, Warner Brothers were alleged to have knowingly tracked users in a way not disclosed in their privacy policies

Wall Street Journal Study html?mod=WSJ_WSJ_US_News_ html?mod=WSJ_WSJ_US_News_6 Did a study of 50 sites to determine how many trackers (cookies, beacons, etc) were installed The 50 sites installed 3,180 tracking files Companies with most tracking tools installed were Google, Microsoft, Quantcast. Wikipedia only site to install none.

Search Engines -Use the ability to track each one of online searches. -Record IP Address, search terms used, time of search -Claim that retaining personal data helps provide better services. -Due to recent privacy concerns major search engines delete IP addresses according to the following schedule: -Yahoo-90 days -Bing - 6 months -Google-9 months

Google and Privacy -Tracks clicks of 99% of users -Track, record, and cross-reference click path behavior i.e. where user goes, what user seeks, does, reads, views, how often and for how long. - Scanning – Gmail allows s to be scanned for content to deliver targeted advertising. -

Government Access logy/20google.html logy/20google.html In 2006, the government issued a subpoena to Google requesting access to their search records. The request was port of the government’s effort to uphold the Child Online Protection Act (COPA). AOL, Yahoo, MSN all complied with subpoenas

Instant Messages -Have a sense of casualness attached them, making them more dangerous. -Archived, stored, and recorded as easily as s -Conversations can be saved on computers

Social Networks -Store information remotely, rather on user’s computers -Identity thieves, scam artists, stalkers, and corporations use social networks to gain information about consumers. -Companies actually operate social networks so they can personally collect data about users to improve their customer service as well as to sell data to advertisers.

Facebook apps personal-information-to-marketing-companies personal-information-to-marketing-companies Facebook apps (FarmVille, Zynga Game Network, Texas HoldEmPoker, FrontierVille and others) send unique Facebook user ID to at least 25 advertising and data firms Most of these firms track the user’s online activates.

Domain Names -Individuals obtain their web site addresses. -ANYONE can look up the owner of a domain name online. -

Online Banking -Convenient but requires transmitting lots of personal information over the internet -Fraudulent websites look like the “real thing” but really store personal information and access bank accounts. -Limit of online theft protection is only $50! -Some banks share information with others for advertising purposes unless you specifically tell them not to.

Cell Phone Tracking html html Two years ago, bank robbers caught by FBI agents obtaining phone logs from mobile phone companies. Obama administration argues warrantless tracking is permitted because Americans enjoy no “reasonable expectation of privacy”.

Demonstration google.com maps.google.com