0% found this document useful (0 votes)
66 views40 pages

Internet Privacy and Surveillance

The document discusses internet privacy and surveillance. It defines internet privacy and provides examples of common internet privacy issues like spying, information mishandling, hacking, tracking, and location tracking. It also discusses how to protect yourself from privacy risks like improving browsing privacy, account security, and using encryption. The document also covers types of surveillance and provides pros and cons of internet privacy and surveillance.

Uploaded by

Beny Miraflor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views40 pages

Internet Privacy and Surveillance

The document discusses internet privacy and surveillance. It defines internet privacy and provides examples of common internet privacy issues like spying, information mishandling, hacking, tracking, and location tracking. It also discusses how to protect yourself from privacy risks like improving browsing privacy, account security, and using encryption. The document also covers types of surveillance and provides pros and cons of internet privacy and surveillance.

Uploaded by

Beny Miraflor
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

INTERNET

PRIVACY
Content Outline

INTERNET PRIVACY SURVEILLANCE


1. INTERNET PRIVACY ISSUES
2. TYPES OF SECURITY 1. FORMS OF SURVEILLANCE
APPLICATION 2. COMMON TYPES OF
3. HOW TO PROTECT YOURSELF SURVEILLANCE
AGAINST MAJOR INTERNET 3. SURVEILLANCE METHODS
PRIVACY RISK 4. PROS AND CONS OF
4. TIPS TO IMPROVE YOUR SURVEILLANCE
INTERNET PRIVACY
5. PROS AND CONS OF INTERNET
PRIVACY
INTRODUCTION AND OBJECTIVE OF THE TOPIC

Have insights in different Internet Privacy


Issues
Establish measures to use against attacks over
internet
Know how to stay safe online

“I think privacy is valuable. You don't have to share everything, and it's healthy to
occasionally hit the pause button and ask yourself if you're oversharing. But at
the end of the day, if you're not doing anything wrong, you don't have anything to
hide.” – Ashton Kutcher

Definition of Terms
Internet Privacy
Surveillance
Internet privacy refers to the vast
range of technologies, protocols Surveillance is the close observation of a
and concepts related to giving person, place, or object. It is the practice of
individual users or other parties watching a subject in order to document the
more privacy protections in their interactions or whereabouts of the subject.
use of the global Internet.
Internet Privacy Issues
SPYING AND SNOOPING
examines the actions of other
individuals or organizations and
gathers information on them (usually
to gain an advantage).
Internet Privacy Issues
INFORMATION MISHANDLING
There are various sites on the
internet that need your personal
information to get access to their services.
These sites often store cookies and save
your personal information and later use it
for various purposes.
Internet Privacy Issues
HACKING
when some cyber thief breaks into
your computer or some third-party
computer that stores all your personal or
financial information.
https://youtu.be/qx1BsZBZfQU
Internet Privacy Issues
TRACKING
If you perform any online activities,
you’re going to leave a trail of “cookies”
that show where you’ve been, what sites
you spent time doing on a website, what
you may have ordered from various online
sites and other private details.
Internet Privacy Issues
LOCATION TRACKING
refers to technologies that physically
locate and electronically record and track
the movement of people or objects.
Location tracking technology is in use
every day with GPS navigation, locations
located on digital pictures and searching
for businesses nearby using common apps.
Internet Privacy Issues
TRADING
Trading is when hackers trade your
personal information and financial data
that they stole from your computer or a
third-party computer that stored your
data.
Internet Privacy
Types of Security
Application
AUTHENTICATION
When software
developers build
procedures into an
application to ensure
that only authorized
users gain access to
it.
Google
Authenticator
LastPass
Authenticator
Microsoft
Authenticator
Twilio
Authy
Types of Security
Application
AUTHORIZATION
After a user has been authenticated,
the user may be authorized to access and
use the application.
Types of Security
Application
ENCRYPTION
After a user has been authenticated
and is using the application, other security
measures can protect sensitive data from
being seen or even used by a
cybercriminal.
Types of Security
Application
LOGGING
If there is a security breach in an
application, logging can help identify who
got access to the data and how.
Application log files provide a time-
stamped record of which aspects of the
application were accessed and by whom.
Types of Security
Application
APPLICATION SECURITY TESTING
A necessary process to ensure that all
of these security controls work properly.
How to protect yourself against
major internet privacy risk
BROWSING PRIVACY
Internet browsers account for much of what people access
online, so protecting your browsing privacy should be one of
your first steps.
Private browsing does not conceal your activity from other
online parties.
Improve your browser privacy by using browser extensions or
specialized browsers
How to protect yourself against
major internet privacy risk
ACCOUNT SECURITY
Most of your personal information—including bank details and
other sensitive items—will be stored on a combination of online
accounts. As such, account security is a major aspect of internet
privacy.
Avoid common password mistakes.
Use two-factor authentication
How to protect yourself against
major internet privacy risk
DATA ENCRYPTION
By encrypting your data, you safeguard it from prying eyes even
in the event that it is intercepted. Encryption is available at
different levels, and most websites and private networks will
provide some level of it.
Use VPN (Virtual Private Network)
Tips to Impove your Internet Privacy
1. Check Social Privacy Settings
2. Don't public storge for private information
3. Evade Tracking
4. Keep your main e-mail address and phone number private
5. Use messaging apps with end-to-end encryption
6. Use secure password
7. Review permissions for mobile apps and browser extensions
8. Secure your phone and computer with passwords or passcodes
9. Disable lock screen notification
10. Stay private on Wi-Fi networks
Pros and cons of Internet Privacy
Pros Cons
It protects those who may be It creates ability to abuse users.
vulnerable to exploitation. Source materials must be
It encourages the freedom of verified to be authentic.
speech. It makes it difficult for people to
It encourages the freedom of get to know other people.
the press. It is easier for people to assume
It encourages innovation the identity of someone else.
It becomes easier to ignore It stops businesses from being
bothersome information. able to track you down.
It creates a system of checks It allows people to play the role
and balances. of a victim.
SURVEILLANCE
Forms of
Surveillance
Corporate Surveillance
term that is used to describe any type of discreet monitoring of activities
within a business or within the industry associated with that business.
Government Surveillance
A government collection of information by ongoing observations of individual
or groups.
Government surveillance may be done for intelligence or law enforcement
investigation, for counterintelligence monitoring, for political intelligence, or
for social control.

Individual Surveillance
Can collect data by engaging in open
source intelligence, social engineering or
hacking into online services.
COMMON TYPES OF SURVEILLANCE

ELECTRONIC SURVEILLANCE

Electronic Surveillance is the type of


documentation private investigators most often
use. It involves utilizing devices like television,
wiretapping, and radios to document activity. It
also includes monitoring an individual’s use of
their phones, email, and social media.
COMMON TYPES OF SURVEILLANCE

PHYSICAL OBSERVATION

Physical Observation is when investigators


physically follow or watch a subject. This can
potentially involve disguises, stakeouts, and
multiple investigators.
COMMON TYPES OF SURVEILLANCE

INTERVIEWS

Interviews are conducted by investigators to


discover as much information as possible about
the subject. The people interviewed could include
family members, neighbors, friends, or coworkers.
COMMON TYPES OF SURVEILLANCE

TECHNICAL SURVEILLANCE

Technical Surveillance encompasses digital


photography and video/audio recordings.
Examples of these are surveillance cameras used
by businesses and dash cameras used by both
police officers and private investigators.
OVERT VS. COVERT
An example of overt investigation
includes the security cameras
businesses use that deter clients from

SURVEILLANCE
stealing. Covert investigation, however,
is undetected, like an undercover
detective trailing a subject

METHODS MOBILE VS. STATIONARY


Mobile investigation involves detectives
following their subjects, whether on
foot or in a vehicle. Stationary
investigation is remaining in one
location, which could include watching
the subject from a parked car.

MECHANICAL VS. HUMAN


Mechanical investigation is the use of
video cameras, voice recorders, and
other such equipment. Human
investigation is when a member of the
investigative team is a direct source of
information.
PROS AND CONS OF
SURVEILLANCE
PROS CONS

Improves Safety Expensive


Collects Information Unable to Prevent
Settle Disputes Crime
Reduction of Crime
ACTIVITY

1. Why is staying safe in the internet


important?
2. Choose 1 Internet Privacy Issue and
explain the danger it may bring.
3. What are your methods in staying safe
online?

You might also like