Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Coxheath Primary School E-safety- Term Purpose To outline the use of the internet in school The use of the internet outside school What are the.
Understanding and Building Basic Networks Chapter 4 Protecting Yourself Online.
The Internet.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Breaking Trust On The Internet
INTERNET SAFETY.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Netiquette Rules.
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Emily Snyder, William Darras, Stephanie Berger.  40Y 40Y.
The Internet Useful Definitions and Concepts About the Internet.
The Internet Facilitates Global data communications.
E SAFETY. SOME FACTS A Talk Talk survey of 500 children aged 6-15 in Feb 2010 found: 5% had communicated with a stranger via webcam. 2% have actually.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
Mohammed Saiyeedur Rahman.  E-commerce is buying and selling goods over the internet. This could include selling/buying mobile phones, clothes or DVD’s.
How It Applies In A Virtual World
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
INTERNET CHAPTER 12 Information Available The INTERNET contains a huge amount of information a huge amount of information information on any topic you.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Cyber Crimes.
The Internet A Wide Area Network across the world The network of networks –Lots of smaller networks joined together.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Reliability & Desirability of Data
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
UNESCO ICTLIP Module 1. Lesson 61 Introduction to Information and Communication Technologies Lesson 6. What is the Internet?
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Internet Safety Internet Safety LPM
Lesson 15 : Networks And The Internet
THE INTERNET. TABLE OF CONTENT CONNECTING TO THE INTERNET ELECTRONIC MAIL WORLD WIDE WEB INTERNET SERVICES.
Online Safety Parent Workshop Helping to keep your children safe online.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Online Safety Parent Workshop Windsor Community Primary School December 10 th 2015.
Society & Computers PowerPoint
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Raising Digitally Literate Citizens Curbar Primary School March 2016.
E-C OMMERCE : T HE E -C ONSUMER AND THE ATTACKS AGAINST THE PERSONAL DATA Nomikou Eirini Attorney at Law, Piraeus Bar Association Master Degree in Web.
E-Safety A Guide for Parents and Carers. The Internet is great because…
Safety.
3.1 Types of Servers.
IT Security  .
Personal spaces.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Emily Snyder, William Darras, Stephanie Berger
Presentation transcript:

Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s Privacy - Neil

Privacy Threat - Ivy 1. Cookies----- is a piece of information that an Internet sent to user’s browser when he access the information on that web site.  Each time when user use his computer to access web site, the information will be sent bank to server by browser. ( E.g, the user buying habit, what the user interest in) 2. HTTP (Hyper Text transfer protocol) is the set of rules that websites and browsers follow in order to communicate.  What page the user want to look at  The last web page you look at  address ( if included in request)

Privacy Threat – Ivy 3. Browsers  Security bugs in browsers 4. Public sector (information sometime is publicly available)  Government data collection (E.g, Telephone Directory)  School register  Hospital --- medical information 5. Downloading ( Spyware )  Freeware & shareware  Music & films 6. Search engines  Search people’s name on Internet

Privacy Threat – Ivy 7.  address set might reveal information ( E.g, A is name or handle, B usually is your Internet Service Provider(ISP) or the organization you work for, C and D are domain that may refer to your area of work or activity and cryptography  Intercept 9. Spam  Purchase online, publish address on website or subscribed to a news service---- may get spam  Spam will compromise and slow down the whole network Anti-spam movement---- Spam filters to filter out and delete spam  Now illegal in Australia---- It is illegal to send, or cause to be sent, 'unsolicited commercial electronic messages'

Privacy Threat - Ivy 10. Electronic commerce Credit card use online---- hackers may steal lists of Credit Card numbers from ISPs and commercial web sites. Personal information---- might be sold to third party or direct marketers Easy to get Spam Buying habit and interest information would be collected 11. Internet relay chat---- similar to telephone party lines Chatting with unknown people ---- involuntary reveal personal information to strangers or criminals To meet people from chat rooms ---- personal safety may be at risk

Medical Privacy - Neil Patient databases – 25% use electronic records Too many eyes – 150 per hospital stay – Sale of personal information – Privacy compromised if you know hospital staff Doctors unwilling to take up eRecords – Security and Privacy concern – Reliability – Lack of protocol

Medical Privacy - Neil Central patient database proposal – NHS wide database for customer records Internet Issues – Network Security – Downtime Attacks can disable system – needs to be 24 hours Leads to necessity for backup – Security issues with respect to backup Potential Attacks – Data Mine on personal records – Change patient details – Lie about identity – retrieve personal data

Children’s Online Privacy - Neil Children are naïve, children are innocent, Internet provides potential abusers a grooming ground. Legislation over use of child’s personal information: COPPA in the US – Amazon accused – Xanga.com fined $1 million CEOP over here

Children’s Online Privacy - Neil Online Identity Adult Check for adults, Why no Age Check for children? – All Internet users would need an ID – Big Brother? Responsibility? Parents! – Watch them online – Read posts? Privacy issue here too! Need to educate children about risks Need to force safe behaviour on the child

Summary Privacy Threat Run time threats Threats on own computer Medical Security improvements Trust Children Attacks Innocence Factor Legislation