ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 2 – Privacy School of Computer Science.

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Consumer Privacy & Protection Joanna Acocella May 22, 2007.
David Abarca, Instructor Del Mar College Computer Corner Online Shopping.
Privacy No matter how exemplary your life is, there are things you want to keep to yourself © 2004, Lawrence Snyder.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Electronic Transaction Security (E-Commerce)
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
ICAICT202A - Work and communicate effectively in an IT environment
Privacy & Personal Information -- Why do we care or do we?
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
THE WHY AND HOW OF DATA SECURITY YOUR ROLE IN DATA STEWARDSHIP DEPARTMENT OF MEDICINE IT SERVICES.
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
HIPAA Privacy & Security EVMS Health Services 2004 Training.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Information Asset Classification
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
“Breach of Privacy” nPresented by Sumit Yadav. Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 8 The Personal Health Record.
Invitation to Computer Science 5th Edition
Health Insurance Portability and Accountability Act (HIPAA)
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
Digital Citizenship Grade Why are we here and what is Digital Citizenship? Part 1: What is Private Online? Part 2: Passwords Part 3: Responsibilities.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
THINK B4 U POST YOUR REPUTATION AND PRIVACY ON SOCIAL NETWORKING SITES.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
As defined in the Generally Accepted Privacy Principles, “privacy” refers to the rights and obligations of individuals and organizations with respect to.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy in Context: Contextual Integrity Peter Radics Usable Security – CS 6204.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
ICC Module 3 Lesson 1 – Computer Architecture 1 / 12 © 2015 Ph. Janson Information, Computing & Communication Computer Architecture Clip 6 – Logic parallelism.
ICC Module 3 Lesson 4 – Networking 1 / 8 © 2015 Ph. Janson Information, Computing & Communication Networking – Clip 4 – Switching School of Computer Science.
ICC Module 3 Lesson 4 – Networking 1 / 16 © 2015 Ph. Janson Information, Computing & Communication Networking – Clip 3 – Protocol encapsulation School.
ICC Module 3 Lesson 2 – Memory Hierarchies 1 / 6 © 2015 Ph. Janson Information, Computing & Communication Memory Hierarchies – Clip 2 – Concept School.
ICC Module 3 Lesson 4 – Networking 1 / 9 © 2015 Ph. Janson Information, Computing & Communication Networking – Clip 6 – Internet addressing School of.
ICC Module 3 Lesson 1 – Computer Architecture 1 / 12 © 2015 Ph. Janson Information, Computing & Communication Computer Architecture Clip 5 – Memory Circuits.
ICC Module 3 Lesson 3 – Storage 1 / 6 © 2015 Ph. Janson Information, Computing & Communication Storage – Clip 1 – Principles School of Computer Science.
ICC Module 3 Lesson 1 – Computer Architecture 1 / 13 © 2015 Ph. Janson Information, Computing & Communication Computer Architecture Clip 2 – Von Neumann.
CHAPTER 5 ETHICS & PRIVACY.
Personal Privacy: Limited Disclosure using Cryptographic Techniques Mark Shaneck Karthikeyan Mahadevan SCLab.
ICC Module 3 Lesson 4 – Networking 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Networking – Clip 0 – Introduction School of Computer.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ICC Module 3 Lesson 2 – Memory Hierarchies 1 / 14 © 2015 Ph. Janson Information, Computing & Communication Memory Hierarchies – Clip 5 – Reading School.
ICC Module 3 Lesson 1 – Computer Architecture 1 / 11 © 2015 Ph. Janson Information, Computing & Communication Module 3 : Systems.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
ICC Module 3 Lesson 3 – Storage 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Storage – Clip 0 – Introduction School of Computer Science.
ICC Module 3 Lesson 2 – Memory Hierarchies 1 / 25 © 2015 Ph. Janson Information, Computing & Communication Memory Hierarchies – Clip 8 – Example School.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Information Security and Privacy By: Joshua Waibel.
2017 TCS SMT Training - Dallas
Confidentiality October 14, 2005.
Part 3.
Social Issues in Computing
Social Issues in Computing
TRACE INITIATIVE: Confidentiality, Data Security, and Procedures for Protocol Violation or Adverse Event.
Presentation transcript:

ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 2 – Privacy School of Computer Science & Communications Ph. Janson

ICC Module 3 Lesson 5 – IT Security 2 / 4 © 2015 Ph. Janson Information security ►Information security  Clip 2 Privacy (protection of Personal Information = PI) Intro clipPrevious clipNext clip

ICC Module 3 Lesson 5 – IT Security 3 / 4 © 2015 Ph. Janson Sensitization to privacy = Confidentiality of our identity  Isolate its different facets against spoofing / blackmail  NOT hide “guilty” facets  Thin border between accountability and privacy ►Integrity of our reputation  Hard won, easily ruined + Obligations for receivers of our private information (PI) ►Most people do not pay attention to privacy … until they loose it patient Etc… resident character citizen author employee consumer PI ThreatsDefensesData securityPrivacy Communications securityInformation securityComputing security

ICC Module 3 Lesson 5 – IT Security 4 / 4 © 2015 Ph. Janson Sensitization to privacy ►More and more PI is  Collected  Stored for ever somewhere in “the cloud” (see Module 3 Lesson 4)  Exchanged  Retrieved by correlation between web sites  Published ►By 3 rd parties whose business model is invading and selling our privacy  Their purported “privacy policies” are mostly fuzzy and misleading “opt-out” rather than “opt-in” ►Beware of “free” services – if they are free their merchandises are their clients = US!  We have no idea about consequences of life in a world that constantly records everything and never forgets anything ThreatsDefensesData securityPrivacy Communications securityInformation securityComputing security