We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31
ITE 101
LIVING IN THE IT ERA
Prepared By: Laurice Mariquina PRIVACY AND SECURITY Outline • Privacy • Security LEARNING OUTCOMES At the end of the lesson, students should be able to: • Gain awareness on the concerns for effective implementation of computer technology • Provide ways of protecting online identity In order to allow efficient and effective use of computers, you need to be aware of the possible effects of technology on people and how to defend yourself on the Web. You need to be aware and vigilant about privacy and organizational security. This topic is about the things you need to know to be prepared for threat, including • Privacy rights – Learn what companies can legally record about the use of the Internet and how they use the information. • Cybercrime – Secure yourself from viruses, Internet scams and identity theft. Privacy and Security • Technology has very positive impact on people, but it is important to recognize the negative, or potentially negative, impact as well. The most significant concerns are: • Privacy – What are threats to personal privacy, and how can we protect our identity? • Security – How can we control the accessing of sensitive information, how can we secure hardware and software Privacy • Technology makes it possible to collect and use data of all kinds, including information about people The following are some of the few ways in which using the internet and the Web can collect data. • When you use search engine, the search service can gather information about you based on the terms you search for and the question you ask. • When you provide personal information on the internet, such as full name and email, to a website, that website can store information. Privacy • Privacy – concern the collection and use of data about individuals. There are three (3) primary privacy issues: • Accuracy relates to the responsibility of those who collect data to ensure the data is correct. • Property relates who owns data. • Access relates to the responsibility of those who have data to control who is able to use the data. The following technologies has impact on privacy: • Large Databases Large organization are constantly compiling information about people. Every day, data is gathered about us and stored in large databases. For example, credit card companies maintain user databases that track cardholder purchases, payment, and credit records. The following technologies has impact on privacy: • Private Networks A program called employee-monitoring software is used by some organization to record virtually everything what their employees do on their computer. For example, an employee used his company’s e-mail to send a highly personal message to a friend, but his boss has been reading his e-mail. The following technologies has impact on privacy: • The internet and the Web Every computer on the internet is identified by IP Address. IP Addresses can be used to trace the internet activities to their origin, allowing computer expert and law enforcement officer to investigate computer crimes such as unauthorized access to network or sharing copyright files without the permission. This information, which contain records about a person’s internet activities, includes the following: • History files include the location, or addresses, of sites that a user have recently visited. • Temporary internet files, also known as the browser cache, contain Web page content and instruction for displaying the content. Whenever a user visits a website, these files are saved by the browser. If the user leaves a site and then return later, these files are used quickly redisplay web content. • Cookies are small data files that are deposited on the user’s hard disk from website he/she visited. Cookies are often store the setting for a website, such as the user’s preferred language or location. Several other threats could violate privacy. Web Bugs – invisible images or HTML code hidden within a web page or e-mail message. These are use transmit information without the user knowledge. For example, when a user opens an email that might contain a web bug, information is sent back to the source of the bug. The receiver server will now know that this email address is active
Spyware – The term spyware used to describe a wide range of
programs that are designed to secretly record and report an individual activity on the internet One (1) of the best defenses against spyware is to exercise caution when visiting new websites and downloading software from an unknown source
Another defense involves using a category of software known as
antispyware or spy removal programs, which designed to detect and remove various types of privacy threats. Security Hacker – people who unauthorized accessing of someone’s computer that contain personal information. Computer Security – specifically focuses on protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage and natural disasters. Cybercrime cybercrime or computer crime is any criminal offense that involves a computer and a network. The three (3) most common type of malware are viruses, worms and Trojan horses. • Viruses – these are program that migrate through networks and operating system, and most attach themselves to different programs and databases. Once activated, these destructive viruses can alter/or delete files. Creating and knowingly spreading virus is a very serious crime. • Worms – these are program that simply replicate themselves over and over again. A recent worm traveled across the world within hours, stopping tens of thousands of computers along its way. Unlike a virus, a worm typically does not attach itself to a program or alter/delete files. The three (3) most common type of malware are viruses, worms and Trojan horses. • The most common types of Trojan horses appear as free computer games and free screensaver program that can be downloaded from the internet. When a user installs one (1) of these program, the Trojan horse secretly installs a virus on the computer system Denial of service • – A denial of service attack attempts to slow down or stop a computer system or network by flooding a computer or network with request for information and data. • The target of these attacker is usually internet service provider (ISP) and specific websites. Once under attack, the server at the ISP or the website become overwhelmed with these request for service and are unable to respond to legitimate users. As a result, the ISP or website is effectively shut down Roque Wi-Fi hotspot • Rogue WI-FI hotspots imitate these free networks. These rogue network operate close to legitimate free hotspots and typically provide strong signal that many users unsuspectingly connect to. Once connected, the rogue networks capture any and all information sent by the users to legitimate sites including username and password. Identity Theft • Identity thieves look for anything that can help them steal someone’s identity, from Social Security number and date of birth, to account information and passwords. Sometimes they gain this information from social networking sites, where users often post detailed personal information such as their birth dates, family member names, home addresses, and many more
• The best defense against identity thieves is to
exercise caution when providing information on social networking sites and use the privacy settings and controls that are provided at the social networking sites. Internet scam • A scam is a fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return. An Internet scam is simply a scam using the Internet. Almost Internet scams are initiated by a mass mailing to unsuspecting individuals. Phishing • Phishing is a term used to describe a malicious individual or group of individuals who are scam users. They do that by submitting e-mails or designing web pages designed to capture online bank, credit card, or other login information. Since these e-mails and websites seem like official Measures to Protect Computer Security • Restricting Access - Access can be restricted through biometric scanning devices and passwords, use secret words or phrases. Use security suites, firewalls, and password managers help with security tasks.
• Encrypting data - The solution is encryption, the process of coding
information to make it unreadable except to those who have a special piece of information known as an encryption key, or, simply, a key Some common uses of encryption include the following: • Hypertext transfer protocol secure (https) requires browsers and websites to encrypt all messages • Virtual private networks (VPNs) encrypt connections between company networks and remote users. • WPA2 (Wi-Fi Protected Access) is the most widely used wireless network encryption for home wireless networks Anticipating Disaster • Companies or individuals should be preparing themselves for disasters by ensuring physical security and data security through a disaster recovery plan • Physical security is concerned with protecting hardware from possible human and natural disasters • Data security is concerned with protecting software and data from unauthorized tampering or damage. Prevent data loss • Making frequent backups of data is essential to prevent data loss. Backups are often stored at an off-site location to protect data in case of theft, fire, flood, or other disasters.
• Incremental backups store multiple versions of data at different
points in time to prevent data loss due to unwanted changes or accidental deletion. REFERENCES • O’Leary, T., O’Leary L., and O’Leary D. (2017). Computing essentials 2017. USA: McGraw-Hill Education • Wempen, F. (2014). Computing Fundamentals Digital Literacy Edition. United Kindgom: John Wiley & Sons, Ltd.
Electronic Sources: • Retrieved from. https://www.computerhope.com Question? END OF PRESENTATION