Presentation is loading. Please wait.

Presentation is loading. Please wait.

ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 2 – Privacy School of Computer Science.

Similar presentations


Presentation on theme: "ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 2 – Privacy School of Computer Science."— Presentation transcript:

1

2 ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 2 – Privacy School of Computer Science & Communications Ph. Janson

3 ICC Module 3 Lesson 5 – IT Security 2 / 4 © 2015 Ph. Janson Information security ►Information security  Clip 2 Privacy (protection of Personal Information = PI) Intro clipPrevious clipNext clip

4 ICC Module 3 Lesson 5 – IT Security 3 / 4 © 2015 Ph. Janson Sensitization to privacy = Confidentiality of our identity  Isolate its different facets against spoofing / blackmail  NOT hide “guilty” facets  Thin border between accountability and privacy ►Integrity of our reputation  Hard won, easily ruined + Obligations for receivers of our private information (PI) ►Most people do not pay attention to privacy … until they loose it patient Etc… resident character citizen author employee consumer PI ThreatsDefensesData securityPrivacy Communications securityInformation securityComputing security

5 ICC Module 3 Lesson 5 – IT Security 4 / 4 © 2015 Ph. Janson Sensitization to privacy ►More and more PI is  Collected  Stored for ever somewhere in “the cloud” (see Module 3 Lesson 4)  Exchanged  Retrieved by correlation between web sites  Published ►By 3 rd parties whose business model is invading and selling our privacy  Their purported “privacy policies” are mostly fuzzy and misleading “opt-out” rather than “opt-in” ►Beware of “free” services – if they are free their merchandises are their clients = US!  We have no idea about consequences of life in a world that constantly records everything and never forgets anything ThreatsDefensesData securityPrivacy Communications securityInformation securityComputing security


Download ppt "ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 2 – Privacy School of Computer Science."

Similar presentations


Ads by Google