Download presentation
Presentation is loading. Please wait.
Published byFay McKenzie Modified over 9 years ago
1
“Breach of Privacy” nPresented by Sumit Yadav
2
Computer Science and Engineering Computer security Aspects nPrivacy (confidentiality ) n integrity n availability
3
Computer Science and Engineering What is privacy? nFor citizens and consumers, freedom from unauthorized intrusion. For organizations, privacy involves the policies that determine what information is gathered, how it is used, and how customers are informed and involved in this process. Privacy is a legal issue, but it's also an information security issue.
4
Computer Science and Engineering How your privacy can be breached? nCookies nKeylooger n spyware (adware)
5
Computer Science and Engineering Cookies nData files can be store and fetch by remote server nWhat they can store ? nHow you can prevent? n Setting the Privacy level to High in the browser n Zonealarm with new privacy protection feature
6
Computer Science and Engineering Key logger nsurveillance tool that records every keystroke nWhat it is used for ? n Employer monitoring their employees. n Monitoring kids activity nWhat if it is abused? n Remotely installing key logger nPrevention n Installing anti spy software
7
Computer Science and Engineering Spy ware n Spy ware modules are created by marketers who want to monitor your customer’s browsing habits. n What is ad ware? n Indication of spy ware n Web sites never seen before are suddenly visible. n Strange toolbar n How to protect yourself from spy ware n Installing Spybot and Ad-Aware.
8
Computer Science and Engineering What to do to improve privacy? n Keep your windows up to date by installing critical updates n Back up regularly n Keep security programs up to date n Surf safely n Be vary of attachments n Don’t swallow the spam: go to http://hoaxbusters.ciac.org for list of internet scams. http://hoaxbusters.ciac.org n Check start-up processes-Launch Msconfig(startup) check with www.answerthatwork.com for unfamiliar entries.www.answerthatwork.com
9
Computer Science and Engineering What to do to improve privacy? TOR(Open Source Project ) n An open-source project, Tor seeks to provide anonymity through a technique called onion routing.Onion routing basically works by implementing numerous routers through which communications will pass. n For more info: (www.freehaven. net/tor)www.freehaven
10
Computer Science and Engineering What if everybody get privacy? nPositive impact n People will be able to surf the web without being traced. n Agents can more easily carry out research and investigations without reveling their identity. nNegative impact n Hacker steal credit card without being caught. n Virus can spread with no knowledge of its origin. Negative effect on law enforcement making possible for criminals and terrorists to elude the law.
11
Computer Science and Engineering Case Study-Google nGoogle’s email service (gmail) n Google scan thought your emails and look for keywords n Google target adds on your system according to the keywords it has collected nGoogle desktop software n Now you can Google your pc Google desktop can search your Outlook / Outlook Express,websites and other documents n Risk of privacy if it’s a public computer
12
Computer Science and Engineering Gramm Leach Bliley Act (GLBA), n Financial institution must provide customers clear and conspicuous notice about its privacy policies n Institution must provide annual notices of its privacy policies and practices nFinancial institution must provide customers with an opportunity to opt out of disclosures of their non-public personal information
13
Computer Science and Engineering HIPPA (Health Care Portability and Accountability Act) npatients’ access to their own medical records nNotice of privacy practices nLimitations on use of personal medical information nRestrictions on marketing medical information nConfidentiality of doctor patient communications
14
Computer Science and Engineering U.S. Privacy Act nProtects the privacy of personal data collected by the government nAllow individuals to determine what data collected and for what purpose nTo whom information has been disseminated
15
Computer Science and Engineering U.S. Electronic Communications Privacy Act nProtects against wiretapping nAllows law enforcement agencies to access communicating or records of them nISP need to install equipments to allow access to agencies ISP can read content of communicating in order to improve security and integrity
16
Computer Science and Engineering USA Patriot Act n Knowingly causing the transmission of code resulting in damage to a protected computer is an offence nRecklessly causing damage to a computer system as a consequence of unauthorized access is also an offence nCausing damage (even unintentionally) as a consequence of unauthorized access to a protected computer is a crime
17
Computer Science and Engineering Reference nPfleeger, Charles and Pfleeger, Shari. “Security in Computing.” http://search.epnet.com/login.aspx?direct=true&AuthType=coo kie,ip,url,uid&db=cph&an=14332860 http://search.epnet.com/login.aspx?direct=true&AuthType=coo kie,ip,url,uid&db=cph&an=14332860 http://search.epnet.com/login.aspx?direct=true&AuthType=coo kie,ip,url,uid&db=cph&an=13669005 http://search.epnet.com/login.aspx?direct=true&AuthType=coo kie,ip,url,uid&db=cph&an=13669005 http://search.epnet.com/login.aspx?direct=true&AuthType=coo kie,ip,url,uid&db=cph&an=11070935 http://search.epnet.com/login.aspx?direct=true&AuthType=coo kie,ip,url,uid&db=cph&an=11070935 n http://search.epnet.com/login.aspx?direct=true&AuthType=coo kie,ip,url,uid&db=cph&an=4110997 http://search.epnet.com/login.aspx?direct=true&AuthType=coo kie,ip,url,uid&db=cph&an=4110997
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.