Download presentation
Presentation is loading. Please wait.
Published byRandolph Webster Modified over 9 years ago
2
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 2 – Privacy School of Computer Science & Communications Ph. Janson
3
ICC Module 3 Lesson 5 – IT Security 2 / 4 © 2015 Ph. Janson Information security ►Information security Clip 2 Privacy (protection of Personal Information = PI) Intro clipPrevious clipNext clip
4
ICC Module 3 Lesson 5 – IT Security 3 / 4 © 2015 Ph. Janson Sensitization to privacy = Confidentiality of our identity Isolate its different facets against spoofing / blackmail NOT hide “guilty” facets Thin border between accountability and privacy ►Integrity of our reputation Hard won, easily ruined + Obligations for receivers of our private information (PI) ►Most people do not pay attention to privacy … until they loose it patient Etc… resident character citizen author employee consumer PI ThreatsDefensesData securityPrivacy Communications securityInformation securityComputing security
5
ICC Module 3 Lesson 5 – IT Security 4 / 4 © 2015 Ph. Janson Sensitization to privacy ►More and more PI is Collected Stored for ever somewhere in “the cloud” (see Module 3 Lesson 4) Exchanged Retrieved by correlation between web sites Published ►By 3 rd parties whose business model is invading and selling our privacy Their purported “privacy policies” are mostly fuzzy and misleading “opt-out” rather than “opt-in” ►Beware of “free” services – if they are free their merchandises are their clients = US! We have no idea about consequences of life in a world that constantly records everything and never forgets anything ThreatsDefensesData securityPrivacy Communications securityInformation securityComputing security
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.