Download presentation
Presentation is loading. Please wait.
1
Cosc 5/4765 Privacy and security
2
Your Thoughts What about privacy?
3
Gathering of Data Financial Organizations
Banks and Credit card companies Retailers and “loyalty” cards Collect spending habits, preferences Amazon and On-line retailers kept information about your purchases to “better advertise” products you may want to purchase. Wal-Mart as an example: Keeps 2 years worth of purchase information Can easily be tied to person purchasing
4
Gathering of Data (2) Telecommunications
Land and mobile phone companies log every call Mobile also location and text messages ISP may log web site usage, searches, etc. Portals, like Google and yahoo, etc log searches, , click results etc. Most of this logging is compelled by legislation
5
Gathering of Data (3) Transportation and movement
There are many traffic monitoring systems Initially for traffic full Can easily be used to monitor a car's movements through the system CCTV cameras Initially used for security purposes Again, easily used to monitor a person's movements GPS devices Cell phones, OnStar, etc. Again many of these system can be used to actively monitor.
6
Gathering of Data (4) There are more and more methods of collecting data about people. The Patriot Act required libraries to turn over check out information (with names) to the federal government Any one piece of data may not be sensitive. Aggregation of all kinds of data from multiple sources and data mining can make it very sensitive.
7
RFID Tags Passive RFID tags can be used to track just about anything
Smallest measure .15mm x .15 mm and thinner then a sheet of paper Passive can be read from about 10 cm (ISO 14443) With Antenna about 10 feet (ISO ) Have no internal power, instead an incoming radio frequency provides the power to transmit a response. RFID tags are showing up in credit cards, passports, drivers licenses and other things people carry.
8
E-mail Security and privacy with e-mail.
Legally, there is very little of either. may pass through any number of systems, where it can easily copied. Most gateways scan for spam and AV Also scanned by other systems for key words and information gathering
9
Web Browsing Privacy, what privacy!
Cookies are used to gather/determine information Vary other things can be done to gather info about you, without your knowledge or consent. Security, the only thing that can be worse then . Programs can be downloaded without your knowledge and installed into your computer Not just viruses and worms. Some web sites will turn around and "attack" your computer.
10
Internet "talk" by "talk" varies program that allow live conversations via the internet. irc, talk, instant messaging, net meeting, internet phone, just to name a few. Privacy: An old problem, like cell phones and cordless phones. Is anybody listening? Some programs log messages on the servers. irc, instant messager, and net meeting. Internet phone, uses irc, so it can be logged and then played back.
11
The argument! What's the problem?
“If you have nothing to hide, then you have nothing to fear.”
12
Enhancing Privacy Encryption Https
and other traffic is then harder to be read/modified by ISPs and other systems. Https Again encrypted traffic, content is protect, but the URL is still known
13
Enhancing Privacy (2) Proxies systems
Proxies and Anonymisers (like anonymizer.com) All traffic is directed through the proxy and noramlly returns it through https, so ISPs only know you are talking to the anonymiser. Privacy web proxies (like privoxy) Configured to protect user's privacy Manages cookies, stripping ads, pop-ups Removing privacy-comprosing headers De-animation of gifs Can hide users IP address
14
Enhancing Privacy (2) Anonymous Routing
Like Tor system (used by torpark brower) Users communicates through a series of anonymisers systems which change regularly. Privoxy also works with the Tor system.
15
security and privacy A good antivirus program can help.
There are not perfect and new viruses attempt to disable them. disable "features" in web browsers and "talk" programs will also help. Clear browser cookies. Scan your computer with varying programs to search for "spyware" and other malicious code. Ad-aware scans for spyware and other tracking info Ad-ware is free, ad-ware plus and professional must be purchased. Spybot Search & Destory Also free, currently the "top" spyware remover.
16
What's running on your computer?
There are many programs that may startup on login. Do you even know how many? Besides slowing down your computer, they maybe also be the cause of security and privacy issues. Besides spyware programs, there are others that can help you find out and remove these programs winpatrol will alert to programs added to the startup folder and the run and runonce And allow you remove already installed programs that startup on boot or login. Upside, can speed up your computer and remove unwanted programs. Downside, you may remove a necessary program.
17
Privacy The question was asked at the beginning of this lecture
What about privacy? UW, State and Federal, and companies hold a vast amount of information about you In this “new age” of the internet, is privacy even an issue with the “younger” generation? With facebook and many social networking systems, where “kids” give away so much information.
18
Privacy and UW In the new Banner/Wyoweb system, social security number are being replaced with a “W number”. As of Summer 2007, SS numbers won’t be used as identification number anymore. Yet a lot of information about you is still held. Most in unencrypted format And passed in the clear around campus via and unencrypted network.
19
Privacy and UW (2) UW uses a non-disclosure policy and varying other policies to cover it’s “assets”. But when you look at all the private data lost articles, they are because these policies are not followed or can’t/didn’t cover it. Sensitive data on stolen laptops, etc.. Break-ins and hacking, etc… So should UW be doing more? And what?
20
Q A &
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.