Download presentation
Presentation is loading. Please wait.
Published byJeffrey Fitzgerald Modified over 9 years ago
1
Chap 10: Privacy in Computing
2
Privacy as an aspect of security Authentication effects on privacy Privacy and the Internet Privacy implications for emerging technologies SE571 Security in Computing Dr. Ogara 2
3
Is the right to control who knows certain aspects about you, your communications, and your activities Information privacy has three aspects: sensitive data affected parties controlled disclosure SE571 Security in Computing Dr. Ogara 3
4
personal identity information finances, credit, bank details medical information school records communications: mail, e-mail, telephone calls, spam illegal activities, criminal records SE571 Security in Computing Dr. Ogara 4
5
Organizations need to protect personal information and sensitive data Companies product plans key customers profit margins newly discovered technologies Hospitals and Schools Personal data for students and patients SE571 Security in Computing Dr. Ogara 5
6
Information collection: Data are collected only with knowledge and explicit consent Information usage: Data are used only for certain specified purposes Information retention: Data are retained for only a set period of time Information disclosure: Data are disclosed to only an authorized set of people SE571 Security in Computing Dr. Ogara 6
7
Information security: Appropriate mechanisms are used to ensure the protection of the data Access control: All modes of access to all forms of collected data are controlled Monitoring: Logs are maintained showing all accesses to data Policy changes: Less restrictive policies are never applied after-the-fact to already obtained data SE571 Security in Computing Dr. Ogara 7
8
Examples: Job applicants asked to turn over their Facebook passwords Job applicants asked to turn over their Facebook passwords Some employers are asking job applicants for Facebook username Some employers are asking job applicants for Facebook username Fork over your Facebook log-on or you don't get hired. What? Fork over your Facebook log-on or you don't get hired. What? Facebook Warns Employers Not to Ask Job Applicants for Log-in Facebook Warns Employers Not to Ask Job Applicants for Log-in SE571 Security in Computing Dr. Ogara 8
9
All of the mobile phone companies keep details about the location of cell towers used by every phone, for a year or longer. All of the mobile phone companies keep records about voice calls and text messages received and sent for a year or longer. Verizon stores the contents of every text message for three to five days. (The others don't keep the text.) IP session information -- tying your phone to an IP address -- is kept for a year by Verizon and 60 days on Sprint and Nextel. IP destination information -- which IP addresses you connected to -- is stored for 90 days at Verizon and 60 days on Sprint and Nextel Source: http://www.infoworld.com/t/internet-privacy/mobile-phone-companies-keep-your- records-longer-you-think-175466 SE571 Security in Computing Dr. Ogara 9
10
Fair information policies U.S. Privacy laws Controls on U.S. government Websites Controls on commercial Websites Non- U.S. privacy principles Anonymity, multiple identities Govern and privacy Identity theft SE571 Security in Computing Dr. Ogara 10
11
Collection limitation. Data should be obtained lawfully and fairly. Data quality. Data should be relevant to their purposes, accurate, complete, and up-to-date. Purpose specification. The purposes for which data will be used should be identified and the data destroyed if no longer necessary to serve that purpose. Use limitation. Use for purposes other than those specified is authorized only with consent of the data subject or by authority of law. SE571 Security in Computing Dr. Ogara 11
12
Openness. It should be possible to acquire information about the collection, storage, and use of personal data systems. Individual participation. The data subject normally has a right to access and to challenge data relating to her. Security safeguards. Procedures to guard against loss, corruption, destruction, or misuse of data should be established Accountability. A data controller should be designated and accountable for complying with the measures to give effect to the principles. SE571 Security in Computing Dr. Ogara 12
13
Problem Above principles describe right of individuals and NOT protection of data collected Solution Reduce data exposure – ask for what is necessary Reduce data sensitivity by interchanging data items Anonymize data - remove/modify identifying information Encrypt the data SE571 Security in Computing Dr. Ogara 13
14
Covers data protection Applies to all personal data held anywhere in the government Examples Fair Credit Reporting Act – consumers credit Health Insurance Portability and Accountability Act (HIPAA) Gramm–Leach–Bliley Act (GLBA) – financial services Children’s Online Privacy Protection Act (COPPA) Federal Educational Rights and Privacy Act SE571 Security in Computing Dr. Ogara 14
15
Problems Target areas of the laws overlap e.g. Which law (if any) would require privacy protection of a university student’s health center bills paid by credit card? Gaps between laws e.g. evolving technologies SE571 Security in Computing Dr. Ogara 15
16
Federal Trade Commission (FTC) has jurisdiction over web sites 5 privacy factors government Websites must address in order to obey the Privacy Act Notice. Data collectors must disclose their information practices before collecting personal information from consumers. Choice. Consumers must be given a choice as to whether and how personal information collected from them may be used. Access. Consumers should be able to view and contest the accuracy and completeness of data collected about them. Security. Data collectors must take reasonable steps to ensure that information collected from consumers is accurate and secure from unauthorized use. Enforcement. A reliable mechanism must be in place to impose sanctions for noncompliance with these fair information practices. SE571 Security in Computing Dr. Ogara 16
17
Federal government agencies post privacy policies on their web sites to disclose: information collected reason for collecting information intended use of the information whom the information will be shared with notice or opportunities for consent security of information the rights of the individual under the Privacy Act SE571 Security in Computing Dr. Ogara 17
18
Some companies display solid and detailed privacy statements while others may not Privacy outside government is protected by other laws: Credit Banking Education healthcare SE571 Security in Computing Dr. Ogara 18
19
FTC can sue companies that engage in deceptive practices Example 2005 CartManager International – runs web shopping cart software was sued by FTC because they sold customer data SE571 Security in Computing Dr. Ogara 19
20
1981 Council of Europe adopted Convention 108 to protect individual data 1995 European Union adopted Directive 95/46/EC, also called European Privacy Directive SE571 Security in Computing Dr. Ogara 20
21
Individual data should be: processed fairly and lawfully collected for specified, explicit and legitimate purposes adequate, relevant, and not excessive in relation to the purposes for which they are collected accurate kept in a form that permits identification of data subjects for no longer than is necessary SE571 Security in Computing Dr. Ogara 21
22
Also individuals have the right to: access data collected about them correct inaccurate or incomplete data have those corrections sent to those who have received the data SE571 Security in Computing Dr. Ogara 22
23
Three more principles to the Fair Information Policies Greater restrictions on data collection and processing that involves “sensitive data - racial or ethnic origin, political opinions, religious beliefs, philosophical or ethical persuasion Authorized users restricted from transferring information to third parties without the permission of the data subject Entities that process personal data should not only be accountable but should also be subject to independent oversight SE571 Security in Computing Dr. Ogara 23
24
Following September 11 terrorist attack, U.S collects data from Passenger Name Record (PRN) – maintained by airlines U.S asked Europe to supply PNR data within 15 minutes of plane departure to the U.S. In 2004, European Commission and European Council accepted the request In 2006, European Parliament and European Court of Justice objected on privacy grounds U.S could deny landing rights to airlines that refuse SE571 Security in Computing Dr. Ogara 24
25
Anonymity Heath issue Sexual orientation Etc SE571 Security in Computing Dr. Ogara 25
26
What are the implications to government access to data? Misuse and violation of privacy rights through access to personal information Data access risks – data errors, inaccurate linking of data, incorrect data and many more SE571 Security in Computing Dr. Ogara 26
27
Data minimization - Obtain least data necessary Data anonymization Audit trail Security and controlled access Training Quality – determine usefulness of data Restricted usage – uses should be consistent with purpose of collecting data Leave data in place with original owner Policy SE571 Security in Computing Dr. Ogara 27
28
SE571 Security in Computing Dr. Ogara 28 Taking another person’s identity Credit card Drivers license
29
Authentication takes three forms Individual – birth certificate, passport/national ID Identity – credit card, meal plan card, magnetic access card Attributes – age to take alcohol or drive SE571 Security in Computing Dr. Ogara 29
30
Data mining threatens privacy We can derive do data mining without sacrificing privacy How? Swapping data fields to prevent linking records Limited swapping balances accuracy and privacy SE571 Security in Computing Dr. Ogara 30
31
Internet is the greatest threat to privacy Sophisticated web applications can know a lot about a user How do users loose privacy on the Internet? User uncertain about authenticity of the server Payments over the Web Credit card payments SE571 Security in Computing Dr. Ogara 31
32
Payment schemes e.g. PayPal Third party ads – mortgages, banking, loans, etc Site and portal registrations Contests and offers – to get private information Technologies Cookies - text file stored on the user’s computer and passed by the user’s browser to the web site when the user goes to that site Cookie may contain users ID, password, a credit card number, the customer name and shipping address, the date of the last visit to the site, the number of items purchased or the dollar volume of purchases SE571 Security in Computing Dr. Ogara 32
33
Spyware is a program or code designed to spy on a user, collecting data (including anything the user types) Keystroke loggers are programs that reside in a computer and record every key pressed. Keystroke loggers sometimes record only web sites visited or, even more serious, only the keystrokes entered at a particular web site (for example, the login ID and password to a banking site.) SE571 Security in Computing Dr. Ogara 33
34
Display selected ads in pop-up windows or in the main browser window Often selected according to user’s characteristics Usually installed as part of another piece of software without notice SE571 Security in Computing Dr. Ogara 34
35
Privacy of an e-mail message can be compromised on either the sender’s or receiver’s side Interception - E-mail is exposed from sender to receiver, and there are numerous points for interception. Without encryption it is difficult to prevent access along the way SE571 Security in Computing Dr. Ogara 35
36
Email monitoring Companies and organizations Network admin ISP Anonymous Email and Remailers Employees sending tips or complaints to management People beginning personal relationships SE571 Security in Computing Dr. Ogara 36
37
Simple Remailers A remailer is a trusted third party to whom you send an e-mail message and indicate to whom you want it sent strips off the sender’s name and address, assigns an anonymous pseudonym as the sender, and forwards the message to the designated recipients removes the recipient’s name and address from reply and forwards it to the sender knows both sender and receiver, so it provides pseudonymity SE571 Security in Computing Dr. Ogara 37
38
SE571 Security in Computing Dr. Ogara 38 E-mail has very little authenticity protection SMTP protocol does not verify the accuracy and legitimacy of the listed sender This enhances spoofing of source address and hence spam because it is difficult to trace real sender
39
SE571 Security in Computing Dr. Ogara 39 RFID Electronic voting VoIP and Skype
40
SE571 Security in Computing Dr. Ogara 40 Uses small, low-power wireless radio transmitters called RFID tags Tags are tuned to a particular frequency and each has a unique ID number When a tag receives its signal, it sends its ID number signal in response Tags are passive – have no power of their own but powered up when they receive signals
41
SE571 Security in Computing Dr. Ogara 41 Uses of RFID Tags toll plaza payments transit system fare cards stock or inventory labels passports and identity cards
42
SE571 Security in Computing Dr. Ogara 42 Privacy Issues Tracking individuals wherever they go Discern sensitive data about people you work for, medical condition (based on medicine bottle), and finances Solutions Disabling tags Blocking/shield from receivers Reprogramme Encryption
43
SE571 Security in Computing Dr. Ogara 43 Privacy Issues Who has voted for who Internet related privacy issues
44
SE571 Security in Computing Dr. Ogara 44 Voice over IP (VoIP) is a protocol for transmission of voice-grade telephone traffic over the Internet Privacy Issues Who has voted for who Internet related privacy issues
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.