Download presentation
Presentation is loading. Please wait.
Published byPrudence Lucas Modified over 8 years ago
1
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski, May 2012 1
2
Introduction Internet: Good or Bad? Privacy/Security Issues Victims? What victims? Scams: How hard are they to spot? Scams: FBI/NW3C. Which ones have you heard of? Privacy Threats Tips to protect yourself Security Threats Tips to protect your computer Personal Privacy & Security - Z. Bahorski, May 2012 2
3
Internet: Good or Bad? “Good” uses of the Internet “Bad” uses of the Internet Personal Privacy & Security - Z. Bahorski, May 2012 3
4
4 Where the hackers are from! Trustwave Global Security Report 2012.pdf
5
Internet: Good or Bad? Should we keep it anyway? Quote: http://www.coursesmart.com/9780136008859/ chap01# Personal Privacy & Security - Z. Bahorski, May 2012 5
6
Privacy/Security Issues: What’s in a name? – Names with Positive connotations – Names with Negative connotations Personal Privacy & Security - Z. Bahorski, May 2012 6
7
Privacy/Security Issues: How can people find information about us? Personal Privacy & Security - Z. Bahorski, May 2012 7
8
Can we really remain anonymous when we use the Web? – How much can a web site tell about you and your computer just by you connecting to their web site? Go to: http://cyscape.com/showbrow.asp?bhcp=1http://cyscape.com/showbrow.asp?bhcp=1 To whom is it advantageous to gather information about you? – Go to: http://www.spokeo.comhttp://www.spokeo.com Personal Privacy & Security - Z. Bahorski, May 2012 8 Privacy/Security Issues:
9
Computers NEVER forget! – Sign in to Google or Gmail – In location box, type in: http://www.google.com/history – Why DOES Google keep track of Key words in Gmail Search phrases Personal Privacy & Security - Z. Bahorski, May 2012 9
10
Victims? What victims? According to the United States Census: – there are now 313,310,928 million people in the United States with over 7 billion in the world (USCB, 2012). – The Federal Trade Commission (FTC) estimates that, “as many as 9 million Americans have their identities stolen each year” (FTC, n.d.). – That is almost 3 percent of the American population! Personal Privacy & Security - Z. Bahorski, May 2012 10
11
Victims? What victims? Identity theft – Using another person’s name, personal identification (driver’s license number, social security number), credit card, or banking information for personal gain Taking advantage of credit history to:* – Buy a car (turn around quickly at an auction house) – Buy a house Taking advantage of credit card or banking info: – Get cash – Open and pay for a cell phone account – Buy goods or services Get government documents – for their new identity! Personal Privacy & Security - Z. Bahorski, May 2012 11
12
Victims? What victims? Identity theft – What to do if you are a victim: – Keep a DETAILED log including dates, times, names and numbers called. Do these 4 things: 1.Call or go online and place a fraud alert: – TransUnion: 1-800-680-7289; www.transunion.com;www.transunion.com – Equifax: 1-800-525-6285; www.equifax.com;www.equifax.com – Experian: 1-888-EXPERIAN (397-3742); www.experian.com; www.experian.com; 2.Close the accounts that have been compromised. 3.File a complaint with the FTC to help police track like-thefts. 4.File a police report (give them a copy of your FTC complaint to add to the police report). From the FTC at: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.ht ml Personal Privacy & Security - Z. Bahorski, May 2012 12
13
Privacy Threats Surveillance: – Cameras Look up! Cameras are “everywhere” (public places and in private places where posted) Look for these! You’ll be amazed! Case: Don’t take pictures in private places – Cookies For an explanation of cookies, go to: http://www.cookiecentral.com/n_cookie_faq.htm#what_are – Spying on Cell Phones: go to http://www.mobilespytool.com/http://www.mobilespytool.com/ Personal Privacy & Security - Z. Bahorski, May 2012 13
14
Privacy Threats Surveillance cont… – Keyloggers Record keys pressed on keyboard: Hardware or Software (easy to do, directions are available on the Internet!) How to Add a keylogger: http://www.youtube.com/watch?v=0X9kNpOJiNQ http://www.youtube.com/watch?v=0X9kNpOJiNQ – Is “FREE” Internet really “free”? Be careful of fake wi-fi – Just how much surveillance is allowed in the workplace? Go to: http://www.youtube.com/watch?v=lO3wuYiITiEhttp://www.youtube.com/watch?v=lO3wuYiITiE Personal Privacy & Security - Z. Bahorski, May 2012 14
15
Tips to Protect Yourself! Protecting yourself online: – Go to: Youtube.com video: Online Security Tips and Most Used Passwords To Avoid – http://www.youtube.com/watch?v=EVODZBOFftI&feat ure=relmfu http://www.youtube.com/watch?v=EVODZBOFftI&feat ure=relmfu – 5 tips to help protect yourself online: (This list is from the PrivacyNowTV video) 1. Don’t use a single password 2. Never access online accounts through an email link 3. Never click on popup ads 4. Macs are vulnerable to phishing scams 5. Use a dedicated credit card for online purchases Personal Privacy & Security - Z. Bahorski, May 2012 15
16
Tips to Protect Yourself! Protecting yourself online: – (my 6 th ): Do not reply to an email to “unsubscribe”! – (my 7 th ): NEVER post anything online that you don’t want posted on a billboard on I-94! Includes: Personal information, pictures, poetry, reports (papers), etc. Facebook (and their “partners”) can USE any picture that you post for any reason. ANY employer (current or future) can view anything you post onto Facebook. (Don’t think that only your friends can see your stuff.) They can pay for this. – (my 8 th ): Don’t use information (such as pet names) as passwords if you include that info online. Personal Privacy & Security - Z. Bahorski, May 2012 16
17
Tips to Protect Your Computer! Protecting your computer: – Tips to help you protect your computer from viruses and spyware: 1.Keep your Operating System updated (don’t ignore updates!) 2.Install a firewall 3.Install antivirus software (2 if you can) 4.Do not open attachments from unknown sources 5.Do not run programs that you’ve downloaded from online unless you check it for viruses first! 6.Do not download from unknown sites. 7.Do not click on ads 8.DO surf wisely! Is the site REALLY worth the RISK? Personal Privacy & Security - Z. Bahorski, May 2012 17
18
Contact Information Zenia C. Bahorski Ph.D. 511 Pray-Harrold Hall Department of Computer Science Eastern Michigan University Email: zbahorski@emich.eduzbahorski@emich.edu Web page: people.emich.edu/zbahorski Images: Microsoft Clipart Personal Privacy & Security - Z. Bahorski, May 2012 18
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.