Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski, May
Introduction Internet: Good or Bad? Privacy/Security Issues Victims? What victims? Scams: How hard are they to spot? Scams: FBI/NW3C. Which ones have you heard of? Privacy Threats Tips to protect yourself Security Threats Tips to protect your computer Personal Privacy & Security - Z. Bahorski, May
Internet: Good or Bad? “Good” uses of the Internet “Bad” uses of the Internet Personal Privacy & Security - Z. Bahorski, May
4 Where the hackers are from! Trustwave Global Security Report 2012.pdf
Internet: Good or Bad? Should we keep it anyway? Quote: chap01# Personal Privacy & Security - Z. Bahorski, May
Privacy/Security Issues: What’s in a name? – Names with Positive connotations – Names with Negative connotations Personal Privacy & Security - Z. Bahorski, May
Privacy/Security Issues: How can people find information about us? Personal Privacy & Security - Z. Bahorski, May
Can we really remain anonymous when we use the Web? – How much can a web site tell about you and your computer just by you connecting to their web site? Go to: To whom is it advantageous to gather information about you? – Go to: Personal Privacy & Security - Z. Bahorski, May Privacy/Security Issues:
Computers NEVER forget! – Sign in to Google or Gmail – In location box, type in: – Why DOES Google keep track of Key words in Gmail Search phrases Personal Privacy & Security - Z. Bahorski, May
Victims? What victims? According to the United States Census: – there are now 313,310,928 million people in the United States with over 7 billion in the world (USCB, 2012). – The Federal Trade Commission (FTC) estimates that, “as many as 9 million Americans have their identities stolen each year” (FTC, n.d.). – That is almost 3 percent of the American population! Personal Privacy & Security - Z. Bahorski, May
Victims? What victims? Identity theft – Using another person’s name, personal identification (driver’s license number, social security number), credit card, or banking information for personal gain Taking advantage of credit history to:* – Buy a car (turn around quickly at an auction house) – Buy a house Taking advantage of credit card or banking info: – Get cash – Open and pay for a cell phone account – Buy goods or services Get government documents – for their new identity! Personal Privacy & Security - Z. Bahorski, May
Victims? What victims? Identity theft – What to do if you are a victim: – Keep a DETAILED log including dates, times, names and numbers called. Do these 4 things: 1.Call or go online and place a fraud alert: – TransUnion: ; – Equifax: ; – Experian: EXPERIAN ( ); Close the accounts that have been compromised. 3.File a complaint with the FTC to help police track like-thefts. 4.File a police report (give them a copy of your FTC complaint to add to the police report). From the FTC at: ml Personal Privacy & Security - Z. Bahorski, May
Privacy Threats Surveillance: – Cameras Look up! Cameras are “everywhere” (public places and in private places where posted) Look for these! You’ll be amazed! Case: Don’t take pictures in private places – Cookies For an explanation of cookies, go to: – Spying on Cell Phones: go to Personal Privacy & Security - Z. Bahorski, May
Privacy Threats Surveillance cont… – Keyloggers Record keys pressed on keyboard: Hardware or Software (easy to do, directions are available on the Internet!) How to Add a keylogger: – Is “FREE” Internet really “free”? Be careful of fake wi-fi – Just how much surveillance is allowed in the workplace? Go to: Personal Privacy & Security - Z. Bahorski, May
Tips to Protect Yourself! Protecting yourself online: – Go to: Youtube.com video: Online Security Tips and Most Used Passwords To Avoid – ure=relmfu ure=relmfu – 5 tips to help protect yourself online: (This list is from the PrivacyNowTV video) 1. Don’t use a single password 2. Never access online accounts through an link 3. Never click on popup ads 4. Macs are vulnerable to phishing scams 5. Use a dedicated credit card for online purchases Personal Privacy & Security - Z. Bahorski, May
Tips to Protect Yourself! Protecting yourself online: – (my 6 th ): Do not reply to an to “unsubscribe”! – (my 7 th ): NEVER post anything online that you don’t want posted on a billboard on I-94! Includes: Personal information, pictures, poetry, reports (papers), etc. Facebook (and their “partners”) can USE any picture that you post for any reason. ANY employer (current or future) can view anything you post onto Facebook. (Don’t think that only your friends can see your stuff.) They can pay for this. – (my 8 th ): Don’t use information (such as pet names) as passwords if you include that info online. Personal Privacy & Security - Z. Bahorski, May
Tips to Protect Your Computer! Protecting your computer: – Tips to help you protect your computer from viruses and spyware: 1.Keep your Operating System updated (don’t ignore updates!) 2.Install a firewall 3.Install antivirus software (2 if you can) 4.Do not open attachments from unknown sources 5.Do not run programs that you’ve downloaded from online unless you check it for viruses first! 6.Do not download from unknown sites. 7.Do not click on ads 8.DO surf wisely! Is the site REALLY worth the RISK? Personal Privacy & Security - Z. Bahorski, May
Contact Information Zenia C. Bahorski Ph.D. 511 Pray-Harrold Hall Department of Computer Science Eastern Michigan University Web page: people.emich.edu/zbahorski Images: Microsoft Clipart Personal Privacy & Security - Z. Bahorski, May