Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Privacy and Security

In order to allow efficient and effective use


of computers, you need to be aware of the
possible effects of technology on people and how
to defend yourself on the Web. You need to be
aware and vigilant about privacy and
organizational security.

Privacy and Security


• Technology has very positive impact on people,
but it is important to recognize the negative, or
potentially negative, impact as well.
• Effective implementation of computer technology
involves maximizing its positive effects while
minimizing its negative effects
Privacy

• Technology makes it possible to collect and use data of all kinds, including information about people.
• When you use search engine, the search service can gather information about you based on the terms you
search for and the question you ask.
• When you provide personal information on the internet, such as full name and email, to a website, that
website can store information.

There are three (3) primary privacy issues:


o Accuracy relates to the responsibility of those who collect data to ensure the data is correct.
o Property relates who owns data.
o Access relates to the responsibility of those who have data to control who is able to use the data.
The following technologies has impact on privacy:

• Larges Databases- For example, credit card companies maintain user databases that track cardholder
purchases, payment, and credit records.

• Private Networks - For example, an employee used his company’s e-mail to send a highly personal message
to a friend, but his boss has been reading his e-mail.

• The Internet and the Web


• Every computer on the internet is identified by IP Address. IP Addresses can be used to trace the internet
activities to their origin
• When a person browses the web, his browser stores critical information onto his computer’s hard disk,
typically without being aware of it.
• History files include the location, or addresses, of sites that a user have recently visited.
• Temporary internet files, also known as the browser cache, contain Web page content and
instruction for displaying the content.
• Cookies are small data files that are deposited on the user’s hard disk from website he/she visited.
Cookies are often store the setting for a website, such as the user’s preferred language or location.
• Web Bugs – invisible images or HTML code hidden within a web page or e-mail message. These
are use transmit information without the user knowledge. For example, when a user opens an
email that might contain a web bug, information is sent back to the source of the bug.
• Spyware – The term spyware used to describe a wide range of programs that are designed to
secretly record and report an individual activity on the internet.
Security

 Hacker – people who unauthorized accessing of someone’s computer that contain personal
information.
 Computer Security – specifically focuses on protecting information, hardware, and software
from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage
and natural disasters.
Cybercrime
• cybercrime or computer crime is any criminal offense that involves a computer and a network.
The three (3) most common type of malware are viruses, worms and Trojan
horses.

• Viruses – these are program that migrate through networks and operating system, and most attach themselves
to different programs and databases. Once activated, these destructive viruses can alter/or delete files.
• Worms – these are program that simply replicate themselves over and over again.
• Denial of service – A denial of service attack attempts to slow down or stop a computer system or network by
flooding a computer or network with request for information and data. The target of these attacker is usually
internet service provider (ISP) and specific websites. Once under attack, the server at the ISP or the website
become overwhelmed with these request for service and are unable to respond to legitimate users. As a result,
the ISP or website is effectively shutdown.
• Rogue Wi-Fi hotspot – Free WIFI networks are available almost everywhere from libraries to
fast-food restaurant and coffee shops. Rogue WI-FI hotspots imitate these free networks.
• Identity Theft – Identity theft is the illegal assumption of someone’s identity for the purpose of
economic gain. Once an identity is stolen, the criminal applies for and obtains new credit cards in
the victim’s name.
• Internet scam - A scam is a fraudulent or deceptive act or operation designed to trick individuals
into providing personal information or spending their time and money for little or no return.
Measures to Protect Computer Security

• Restricting Access - Access can be restricted through biometric scanning devices and passwords
• Encrypting data - Whenever information is sent over a network or stored on a computer system,
the possibility of unauthorized access exists

o Hypertext transfer protocol secure (https) requires browsers and websites to encrypt all
messages
o Virtual private networks (VPNs) encrypt connections between company networks and remote
users.
o WPA2 (Wi-Fi Protected Access) is the most widely used wireless network encryption for home
wireless networks
 Anticipating Disaster - Companies or individuals should be preparing themselves for disasters
by ensuring physical security and data security through a disaster recovery plan
o Physical security is concerned with protecting hardware from possible human and natural
disasters
o Data security is concerned with protecting software and data from unauthorized tampering or
damage. Most large organizations have disaster recovery plans describing ways to continue
operating until normal computer operations can be restored
• Prevent data loss - Making frequent backups of data is essential to prevent data loss. Backups are
often stored at an off-site location to protect data in case of theft, fire, flood, or other disasters.
Incremental backups store multiple versions of data at different points in time to prevent data loss
due to unwanted changes or accidental deletion.
• End of slide

You might also like