Vous êtes sur la page 1sur 19

PRIVACY,SECURTY AND

ETHICS

Member group:
NIHAYATUL AZIZAH BT. IMAM SYAFII
SITI NUR ATIKAH BT. IBRAHIM
INTAN NURUL SYAFINAZ BT. AZMAN
LIM YI HUI @VIVIEN
NABILAH BT.SHAMSUDDIN

INTRODUCTION
The ubiquitous use of computers and
technology prompts some very important
questions about the use of personal data and
our right to privacy.
This chapter covers issues related to yhe
impact of technology on people ourselves on
the Web.

Privacy What are the threats to personal privacy


and how can we protect ourselves?
Security How can access to sensitive information
be controlled and how can we secure hardware and
software?
Ethics How do the actions of individual users
and companies affect society?

PRIVACY
Privacy concerns the collection and use of data
about individuals
Three primary privacy issues:
Accuracy
Property
Access

LARGE DATABASES
Large organizations compile information about us.
Federal government has over 2,000 database
Telephone companies- Reverse directory lists of
calls we make
Supermarkets What we buy and when
Information resellers or information brokers
Collect and sell personal data
Electronic profiles easily created

personal information is a marketable commodity,


which raises many issues:
Collecting public, but personally identifying
information (e.g Googles Street View)
Spreading information without personal
consent,leading to identity theft
Spreading inaccurate information-Mistaken
identity,Freedom of Information Act

PRIVATE NETWORK
Employers can monitor e-mail legally
75% of all businesses search employees electronic
mail and computer files using snoopware
A proposed law could prohibit this type of
monitoring or at least require the employer to notify
the employee first.

THE INTERNET AND


THE WEB

Illusion of anonymity

-People are not concerned about privacy when surfing the internet or when

sending e-mail.
History file in Web browser

-Include the locations or addresses of sites that you have recently visited.

-Can displayed by your browser in various location including address bar

and history bar.


Temporary Internet files/browser cache

-Contain web page content and instruction for displaying this content.

-For example,files are saved by browser when you visit a website.

-But,if you leave a site and then return later,these files are used to quickly

redisplay web content.

Cookies
-web activity can be monitor with cookies.
-small data files that are deposited on hard disk from websites that you
have
visited.
-it can be accepted or blocked,based on browsers settings.
-can stored information,preferences and browsing habits and it
depends on:
1. First-party cookie
-generated (and then read) only by the website that currently visit.
-use to store information about the current session,general
preferences and
activity on the site.
-to provide a personalized experience on a particular site.

Third-party cookie /tracking cookies


-usually generated by an advertising company that is affiliated with
the website
that currently visit.
-used by the advertising company to keep track of your web activity
as you
move to next site.
-helps websites deliver ads that interest you.

Private mode
-ensures that your browser activity is not recorded on your hard disk.
-for example,Internet Explorer 9 provides InPrivate Browsing and
Safari
provides Private Browsing.

Web bugs
-invisible images or HTML code hidden within a web page or
e-mail message,can be used to transmit information without your
knowledge.
Spyware
-used to describe a wide range of programs that are designed to secretly
record
and report an individuals activities on the internet.
-run in the background,invisible to the everage user.
-to exercise caution when visiting new websites and downloading
software
from an unknown source.

-computing monitoring software:


-perhaps the most invasive and
dangerous type of spyware and known as a
.
keystroke logger (record every
activity and keystroke including credit card
numbers,passwords and e-mail messages.
-can be deposited onto hard drive
without your knowledge.
-antispyware/spy removal programs
-designed to detect and remove various
type of privacy threats.

ONLINE IDENTITY
-the information that people voluntarily post
about themselves
online.
-think online identity as something shared
between friend,the
archiving and search features of the web
make it available
indefinitely to anyone who cares to look.

M A J O R L AW S O N P R I VA C Y
-federal laws governing privacy matters have been created :
-Gramm-Leach-Bliley act:
-protects personal financial information.
-Health Insurance Portability and Accountability Act
(HIPAA):
-protects medical records.
-Family Educational Right and Privacy Act (FERPA):
-restricts disclosure of educational records.

SECURTY

Someone gain unauthorized access to our computer


or other computer that contain information about
us is known computer hackers
Security invoves protecting individual and
organization from theft and danger
Computer security specifically focuses on
protecting information,hardware,software from
unauthorized use,preventing or limiting the
damage from instrusion,sabotage and natural
disaster

CYBERCRIME
Any criminal offense that involve a computer and a network
Cybercrime can take various form like creation of malicious
program,denial of service attacks,internet scam,identify
theft,cyerberbulling,rogue Wi-Fi hotspot,and data manipulation.
i-Malicious program:
Virus
Program that migrate through network and operating system,and most
attach themselves to different programs and database
Worms
Program that simply replicate themselve over and over again.A recent
worm traveled across the world within hours,stopping tens of thousand
of computer along its ways.
Trojan Horses
Programs that appear to be harmless,however the contain malicious
programs.Trojan houses not a virus but carries virus.When user install
one programs,Trojan also secretly install.

ii-Zombie
Computer infected by a virus,worm,or Trojan horses that allow them to be
remotely controlled by malicious pupose.A collection of zombie is known
botnet or robot network.Botnet harness combines power of many zombie like
password cracking or sending junk e-mail.

iii-Denial of service
Attempt to slow down or stop a computer system or network by flooding a
computer or network with request for information and data.The target it attack
is internet vice provider(ISPs) ad specific websites.If it attack,ISP or website is
effectively shut down.

iv-Rogue Wi-Fi Hotspot


Imitate these free network.These rogue network stronger signal that many user
unsuspectingly connet to.If connected,the rogue capture any and all information
sent by the user to legitimate sites including user name and password.

Vi-Computer Fraud and Abuse Act


Makes it crime for unauthorized persons even to view-let alone copy or damage-data using any
computer across state lines.It also prohibit unauthorized used any government computer or a computer
used by any federally insured financial institution.

Vii-Identity Theft
Illegal assumption of someone identity for the purpose of economic gain.Once an identity is stolen ,the
criminal applies for and obtain new credit card in the victim name and then use the card to purchase
clothes,card and even house.

X-Internet Scam
A scam is a fraudulent or deception act or operation designed to trick individual into providing personal
information or spending their times and money for little or no return.
Internet scam is simply a scam using the internet.A technique often employed by scammer is phishing
which is to trick internet user into thinking a fake but official-looking websites or e-mail is legitimate.

Xi-cyberbullying
Use the internet ,cell-phone,or other device to send or post content intended to hurt or embarras another
person.

THE END ..
THANKS YOU

Vous aimerez peut-être aussi