CS44 – Nick Ragouzis – 2007 Privacy – a study in assiduity –

Slides:



Advertisements
Similar presentations
You are responsible for security of your internet banking transactions ONLINE.
Advertisements

Part I: Making Good Online Choices
Accessing and Using the e-Book Collection from EBSCOhost ® When an arrow appears, click to proceed to the next slide at your own pace. To go back, click.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
Lathrop Intermediate School Cyber Savvy Week December 1 – December 5, 2014 Be RespectfulBe ResponsibleBe Safe ELA & Reading Intervention Classrooms Monday,
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
PRIVACY: What does it mean?? Molly, Julia, Erin and Andrew Project.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Certificate Authority Security Council (CASC) 2015 Consumer Trust Survey.
Internet Safety.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
Protecting Yourself Online (Information Assurance)
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
Have Fun, Be Safe Strategies for Internet and Social Media Safety.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Day 2. The norms of appropriate, responsible behavior with regard to technology use Communic ation Commerce Literacy Access Etiquette Law Rights & Responsibi.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
SURFING THE WEB PRIVACY, SAFETY, AND RELIABLE SOURCES.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Lecture 17 Page 1 CS 236 Online Privacy CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety Presentation by Diahn Hess. Overview Internet Safety Private and personal information Meeting people online Safe interactions Cyberbullying.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Safe Computing Practices. Why would anyone want to hack me? 1 Krebs, Brian - “The Scrap Value of a Hacked PC, Revisited”, 12 Oct 2012,
Behavioral Advertising Privacy, Consumer Attitudes and Best Practices Frances Maier, CEO.
Using a Portaportal for Technology Integration Chrystalle Doyle Ashton Elementary.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
GUIDE TO INTERNET SAFETY A VISUAL WALKTHROUGH TO SAFE INTERNET BROWSING.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
On/Offline Countersurveillance By Collin Donaldson.
Mesa Wi-Fi 802.1x PEAP and EAP-TLS Authentication for Wi-Fi.
Internet Basics 10/23/2012. What is the Internet? It’s a world-wide network of computer networks. It grows hourly and involves national governments, communities,
CS 115: COMPUTING FOR THE SOCIO-TECHNO WEB TECHNOLOGIES FOR PRIVATE (AND NOT-SO-PRIVATE) COMMUNICATIONS.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
PUBLIC COMPUTER SAFETY
Managing Windows Security
Hotspot Shield Protect Your Online Identity
VPN Joshua Turner.
Password Management Limit login attempts Encrypt your passwords
Information Security Footprint.
CS 115: COMPUTING FOR The Socio-Techno Web
Pooja programmer,cse department
Digital $$ Quiz Test your knowledge.
Chapter 3: Protecting Your Data and Privacy
Internet Safety – Social Media
Presentation transcript:

CS44 – Nick Ragouzis – 2007 Privacy – a study in assiduity –

CS44 – Nick Ragouzis – 2007 Assiduous adj. 1: marked by careful unremitting attention … … or persistent application Assiduity n. 1: the quality or state of being assiduous : DILIGENCE 2: persistent personal attention

CS44 – Nick Ragouzis – 2007 Asymmetry in Value and Options

CS44 – Nick Ragouzis – 2007 What does this suggest to you?

CS44 – Nick Ragouzis – 2007 Privacy for Chocolate?

CS44 – Nick Ragouzis – 2007 Source: IdentityEconomics.com

CS44 – Nick Ragouzis – 2007 Source: zillow.com Expectation of privacy?

CS44 – Nick Ragouzis – 2007 Key to Vigilance: “Why?”

CS44 – Nick Ragouzis – 2007 Passwords If you’ve got to go … online: The best privacy protection you’ve got Until you get something better

CS44 – Nick Ragouzis – 2007 Password Savvy Card pins are different: Remember and destroy* Don’t worry: write it down, keep it with you Long password: 12 glyphs Something you will remember: not tough for you Follow rule or its variations, e.g.: First and last third: Caps Middle third: Numbers and punctuation Avoid complete dictionary words; personal details Vary passwords across systems, please Don’t be complacent: Naked userid and password are just not smart privacy and security policy

CS44 – Nick Ragouzis – 2007 Challenge Questions Working For You

CS44 – Nick Ragouzis – 2007 Distributed Identity Systems are Savvy

CS44 – Nick Ragouzis – 2007 Wireless Networks Do you really need to hook up right now?

CS44 – Nick Ragouzis – 2007 Hygienic Wireless Replace your home WiFi with WPA2 units Set it up properly! Follow hygienic wired practices: Separate from your internal wired net Move to wired for important data Use savvy password practices Secure *before* identifier exchange Encrypted data exchange Secure identifiers

CS44 – Nick Ragouzis – 2007 Free Wireless & Kiosks Security before Convenience Follow savvy practices Clear history Delete cookies: before and after Do not insert unencrypted media In any case: Avoid financial transactions Keystroke loggers, etc. Consider: Anonymous secure proxy browsing

CS44 – Nick Ragouzis – 2007 Privacy is not Free Exercising choice Controlling made decisions Rewarding those who honor privacy Punish those who don’t

CS44 – Nick Ragouzis – 2007 Choosing Privacy Read the policy, know what’s right, or not Specific, articulated purpose Specific data Specific, limited, availability of data Understand their ‘data sharing’ partnerships No pass-through of web-bugs/beacons Aggregate data only Limited time; EU: 12 months

CS44 – Nick Ragouzis – 2007 Recognize Trouble We may collect information that can identify you when using our website or in some other manner (think partnership with free wireless, e.g.,) or from our business partners (any one who pays us, e.g.,) or from third parties (or just from anywhere else). We may combine the personal information that we receive from different sources. Your choices: suck it up, or go away. Editorialized slightly from: evite.com/pages/custservice/privacy.jsp, October, 2007

CS44 – Nick Ragouzis – 2007 Use only Session Cookies

CS44 – Nick Ragouzis – 2007 evite.com/webbug.img?u=wetrackyou Install and learn to use AdBlock Single-pixel transparent non-linking gifs Personalized beacons attached to banners

CS44 – Nick Ragouzis – 2007 evite.com/webbug.img?u=wetrackyou Install and learn to use AdBlock

CS44 – Nick Ragouzis – 2007 Know your Counterparty This requires special attention!

CS44 – Nick Ragouzis – 2007 Can you see the problem?

CS44 – Nick Ragouzis – 2007 Attend to Details

CS44 – Nick Ragouzis – 2007 Avoiding the Hook Sender: … a m e r c a … Look closely at the sender If necessary (for s purporting to be from high- value services), look inside the header Click-here links: Always look closely at the URL Preferred: only use book-marked URLs to financial institutions or private data collections

CS44 – Nick Ragouzis – 2007 Google Safe Browsing for Firefox

CS44 – Nick Ragouzis – 2007 New IE Address Bar Indicators

CS44 – Nick Ragouzis – 2007 Using Encrypted Services

CS44 – Nick Ragouzis – 2007 Read the Source …

CS44 – Nick Ragouzis – 2007

Discussion

CS44 – Nick Ragouzis – 2007 Privacy Resources eff.org idcommons.net cdt.org