Download presentation
Presentation is loading. Please wait.
Published byLindsay Singleton Modified over 9 years ago
1
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused by users Technological developments and how they are eroding privacy and anonymity Reasons why employers are monitoring employee’s computer usage How public-key encryption threatens U.S. security, both foreign and domestic The U.S. government’s proposed key recovery plan and how it threatens the growth of internet commerce COMPUTERS IN YOUR FUTURE 2004 What You Will Learn
2
What is identity theft? Identity theft is obtaining enough information about an individual to open a credit card account in their name and charging items bought to that account Examples of information needed are name, address, social security number and other personal information Laws limit liability to $50 for each fraudulent charge Affects credit reports
3
The Internet and privacy Privacy refers to an individual’s ability to restrict the collection, use and sale of confidential personal information The Internet is eroding privacy through web sites selling information collected through registration forms Few laws regulate selling personal information Privacy refers to an individual’s ability to restrict the collection, use and sale of confidential personal information The Internet is eroding privacy through web sites selling information collected through registration forms Few laws regulate selling personal information
4
The Internet and encryption Encryption refers to the coding of information so that it is only readable by the intended recipient Used in electronic commerce transactions and e-mail Provides a way to use the Internet in a safe secure way Could be used misused by criminals and terrorists
5
What is anonymity? Anonymity is the ability to convey a message without disclosing one’s identity It can be abused because it frees people from accountability Defamation is the act of injuring someone’s reputation by making false statements Libel occurs when malicious statements are made in writing
6
How is technology eroding privacy and anonymity? Computers and the Internet enable marketing firms, snoops, and government officials to collect information in ways that are hidden from view Methods used on the Internet are: Cookies Global Unique Identifiers (GUIDS)
7
What are cookies? Cookies are small files that are written to an individual’s hard drive by web sites visited Legitimate purposes include recording information for future use; Example: retail sites using “shopping carts” Questionable practices include banner ad companies tracking a user’s browsing actions and placing banner ads on web sites based on those actions
8
Examples of cookies
9
What is a global unique identifier (GUID)? A GUID is a unique identification number generated by hardware or a program Used to send user information back to site that created it
10
Privacy in the workplace Employees are given e-mail and Internet access at work Companies concerned over employees wasting time surfing the net and sending personal e-mail Three-quarters of large corporations monitor employees’ phone calls, e-mail, web browsing habits and computer files Laws do not protect employees from being monitored
11
Some things to remember at work 1.Do not use the employer’s phone for personal calls 2.Do not use the employer’s e-mail for personal messages 3.Assume everything you do at work is being monitored
12
Protecting online privacy 1.Browse anonymously- Use web sites such as www.anonymizer.com or www.the-cloak.comwww.anonymizer.com www.the-cloak.com 2.Disable cookies on your web browser 3.Use free e-mail addresses for information placed on web sites 4.Don’t divulge personal information to online strangers 5.Make sure registration forms have a privacy policy statement
13
What is encryption? Encryption refers to the coding of information so that it is only readable by the intended recipient A readable message is called plaintext Encryption key is a formula used to make plaintext unreadable Symmetric key encryption algorithms are encryption techniques that use the same key to encrypt and decrypt a message Data Encryption Standard (DES) is a commonly used encryption system
14
What is public key encryption? Public key encryption uses two different keys Public key is the encryption key Private key is the decryption key Used in e-commerce transactions Provides a secure channel for information Computationally intensive or it places a heavy burden on the CPU Vulnerable to cryptanalysis or code breaking Key length is the length of an encryption key
15
What are public security issues involving encryption? Encryption can be used for illegal means as well as legitimate means Encryption will devastate law enforcements ability to fight crime Public key encryption can also be used in telephone conversations Law enforcement agencies are asking for laws enabling them to eavesdrop on encrypted messages
16
Hushmail Email Pretty Good Privacy How can you protect your online privacy?
17
Surfing Anonymously
18
Anonymous Services
19
THE END
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.