Download presentation
Presentation is loading. Please wait.
Published byHoward Rogers Modified over 8 years ago
1
Allison Gladkowski
2
About privacy and why it matters Spyware and spam vocabulary and examples Identity theft Unapproved access Today's big issues Protection tips The future
3
Privacy- an individuals ability to restrict or eliminate the collection, use, and sale of confidential personal information. Argued that privacy isn't an issue unless you have something to hide.
4
The right to informed decision making Decide who sees your information The right to control Total control of your own data The right to leave Delete, not just disable
5
Security breaches can still happen to disabled accounts You give consent to give your info, but then companies sell it Spyware – software that collects your personal data
6
Cookies – allows companies to track what you do online Banner ads – targeted to match your browsing habits Keyloggers – records passwords and account numbers
7
File Infectors – viruses attached to a file Payload – dangerous action virus takes SPIM – spam text instant message Malware – (malicious software) damages or infiltrates computer Phishing – posing as a company to get your information Swindlers – bogus, at-home scams
8
Identity Theft – obtains information to impersonate you Forgery – making data appear like it comes from another user Hackers – people or programs that take over capability of your computer
9
Corporate Espionage – unauthorized access to corporate information Crackers (Black Hats) – gain entry to highly secured systems Ethical Hackers (White Hats) – use their hacking abilities to better defense Memory Shaving – Stealing your RAM
10
Cyber Stalking, Cyber Bullying, RFID Radio Frequency Identification (RFID) – radio waves track chips in an object Identity thieves are now using RFID readers to hack your credit card and your identity
11
Companies can legally monitor their employees when they are using the company equipment – even if you are connected to their WIFI on your own device Use your own device on your own time Monitoring mainly for productivity, efficiency, and competition
13
1. Surf the web anonymously 2. Create strong passwords 3. Have a “throwaway” email for social media and store ads 4. Biometric Authentication – physical trait logins Ex: fingerprint or retinal scanner
14
Mark Weiser coined the term Ubiquitous Computing Ubiquitous Computing – computing everywhere, embedded in our lives, and being placed in everything He predicts we will sacrifice privacy for convenience as technology grows
15
Privacy is important to protect yourself from security breaches and scams People can steal your identity on or offline and it can take many forms Unapproved access is illegal, but can help a corporation (white hats) You can better protect yourself by making “stronger” passwords and using biometric authentication logins The future predicts technology will be in every aspect of our lives & less privacy
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.