Free Cookies and Other Security and Privacy Issues.

Slides:



Advertisements
Similar presentations
What Are the Functions of ATM Machines?
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Money and Financial Institutions. In the monetary system goods and services are indirectly exchanged using money, which can then be exchanged for other.
ICT at Work Banking and Finance.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Security, Privacy, and Ethics Online Computer Crimes.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Chapter 17 Controls and Security Measures
Chapter 9 Information Systems Ethics, Computer Crime, and Security
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Unit 5 BANKING –Banking Basics
Do Now: Banking Basics By the end of this block you should have an understanding of personal banking services and how they can benefit you.
Bank On It The Basics. Homework (Passport page 9)
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Protecting ICT Systems
Chapter 11 Security and Privacy: Computers and the Internet.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
IDENTITY THEFT By: Jessica Rodriguez. Info on Identity Theft Identity theft is the fastest growing crime in the USA. The number of cases nationwide in.
Unit 19 INTERNET SECURITY
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Chapter 10 Money and Banking.
Internet Security for Small & Medium Business Week 6
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Chapter 3, Section 3 ELECTRONIC BANKING.
Types of Electronic Infection
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
Indiana Department of Financial Institutions BANK ON IT Money Smart Course.
Security, Social and Legal Issues Regarding Software and Internet.
Medical Manager Unit 9 ICBS 170. Medical Manager Electronic Data Interchange (EDI)  Ability to request, receive, transfer and integrate information electronically.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
ICT in Healthcare. Electronic prescription service GPs and nurses can send electronic prescriptions to a dispenser (pharmacy) of the patients choice.
Data Security.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Society & Computers PowerPoint
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2005 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Fri. 4/15. Ch. 10 Money and Banking 10.3 Notes “Banking Today”
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Handling Personal Data
Personal Finance Chapter 5.
UNIT 19 Data Security 2.
Presentation transcript:

Free Cookies and Other Security and Privacy Issues

Objectives u Computers and Privacy u Clipper chip u Data communications, database access, money transfer u Protection of computers u Privacy rights

Need for information vs. right to privacy u Cashless society u Perception of timeliness u Up-to-date information u Right to privacy not explicit u What does privacy mean? u credit checks u mailing lists u targeting

Wiretapping and the Clipper chip u Should the government be able to decipher your encrypted communications?

u does not belong to you. (Yours belongs to BSU.) u This is not true of US Postal Service. u Should the owner of a machine be responsible for what is stored on it?

Record Matching u Using information in separate dBs and matching on some key like SSN

Money u Credit Reporting u Error-filled u EFT -- Electronic Funds Transfer u Automatic deposit, ATM, credit card, etc. u This is the trail of your life! u Should these private collections be licensed and controlled?

Security u Two meanings u Access u password u badge/card u shut down machine/account when not there

Security u Safety u UPS--uninterrupted power supply u surge protection u off-site backups u mirroring u disaster recovery plan

Networks u Intranet and Internet u Firewall protection -- puts up a wall between your LAN and the Internet u Internet Server Logs u Internet Cookies u Encryption and Certificates u Should you accept cookies from strangers?

Viruses u Protection -- buy a good virus checker and update it regularly.

Law u You have the right to correct your credit record. You don not need to pay someone to do this. u You can ask the gov’t what they know about you. (However, you have to be pretty specific.) u Federal agencies and databases are subject to regulations, but not private individuals and info stores.

Summary u Computers and Privacy u Clipper chip u Data communications, database access, money transfer u Protection of computers u Privacy rights

Questions?