0% found this document useful (0 votes)
37 views31 pages

Lesson 3 Privacy and Security

Uploaded by

rltmoreno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views31 pages

Lesson 3 Privacy and Security

Uploaded by

rltmoreno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

ITE 101

LIVING IN THE IT ERA


Prepared By: Laurice Mariquina
PRIVACY AND SECURITY
Outline
• Privacy
• Security
LEARNING OUTCOMES
At the end of the lesson, students should be able to:
• Gain awareness on the concerns for effective implementation of
computer technology
• Provide ways of protecting online identity
In order to allow efficient and effective use of
computers, you need to be aware of the possible
effects of technology on people and how to defend
yourself on the Web. You need to be aware and vigilant
about privacy and organizational security.
This topic is about the things you need to know to
be prepared for threat, including
• Privacy rights – Learn what companies can legally record about the
use of the Internet and how they use the information.
• Cybercrime – Secure yourself from viruses, Internet scams and
identity theft.
Privacy and Security
• Technology has very positive impact on people, but it is important to
recognize the negative, or potentially negative, impact as well.
The most significant concerns are:
• Privacy – What are threats to personal privacy, and how can we protect
our identity?
• Security – How can we control the accessing of sensitive information,
how can we secure hardware and software
Privacy
• Technology makes it possible to collect and
use data of all kinds, including information
about people
The following are some of the few ways in
which using the internet and the Web can
collect data.
• When you use search engine, the search
service can gather information about you
based on the terms you search for and the
question you ask.
• When you provide personal information on
the internet, such as full name and email, to
a website, that website can store
information.
Privacy
• Privacy – concern the collection and use of data about individuals.
There are three (3) primary privacy issues:
• Accuracy relates to the responsibility of those who collect data to ensure the
data is correct.
• Property relates who owns data.
• Access relates to the responsibility of those who have data to control who is
able to use the data.
The following technologies has impact on privacy:
• Large Databases
Large organization are
constantly compiling
information about people.
Every day, data is gathered
about us and stored in large
databases. For example, credit
card companies maintain user
databases that track
cardholder purchases,
payment, and credit records.
The following technologies has impact on privacy:
• Private Networks
A program called employee-monitoring
software is used by some organization
to record virtually everything what
their employees do on their computer.
For example, an employee used his
company’s e-mail to send a highly
personal message to a friend, but his
boss has been reading his e-mail.
The following technologies has impact on privacy:
• The internet and the Web
Every computer on the internet is identified by IP Address. IP Addresses
can be used to trace the internet activities to their origin, allowing
computer expert and law enforcement officer to investigate computer
crimes such as unauthorized access to network or sharing copyright
files without the permission.
This information, which contain records about a
person’s internet activities, includes the following:
• History files include the location, or addresses, of sites that a user have
recently visited.
• Temporary internet files, also known as the browser cache, contain Web
page content and instruction for displaying the content. Whenever a user
visits a website, these files are saved by the browser. If the user leaves a
site and then return later, these files are used quickly redisplay web
content.
• Cookies are small data files that are deposited on the user’s hard disk
from website he/she visited. Cookies are often store the setting for a
website, such as the user’s preferred language or location.
Several other threats could violate privacy.
Web Bugs – invisible images or HTML code hidden within a web page
or e-mail message. These are use transmit information without the
user knowledge. For example, when a user opens an email that might
contain a web bug, information is sent back to the source of the bug.
The receiver server will now know that this email address is active

Spyware – The term spyware used to describe a wide range of


programs that are designed to secretly record and report an individual
activity on the internet
One (1) of the best defenses against spyware is to exercise caution
when visiting new websites and downloading software from an
unknown source

Another defense involves using a category of software known as


antispyware or spy removal programs, which designed to detect and
remove various types of privacy threats.
Security
Hacker – people who unauthorized
accessing of someone’s computer that
contain personal information.
Computer Security – specifically focuses
on protecting information, hardware,
and software from unauthorized use, as
well as preventing or limiting the
damage from intrusions, sabotage and
natural disasters.
Cybercrime
cybercrime or computer crime is any criminal offense that involves a
computer and a network.
The three (3) most common type of malware are
viruses, worms and Trojan horses.
• Viruses – these are program that migrate
through networks and operating system, and
most attach themselves to different programs
and databases. Once activated, these destructive
viruses can alter/or delete files. Creating and
knowingly spreading virus is a very serious crime.
• Worms – these are program that simply replicate
themselves over and over again. A recent worm
traveled across the world within hours, stopping
tens of thousands of computers along its way.
Unlike a virus, a worm typically does not attach
itself to a program or alter/delete files.
The three (3) most common type of malware are
viruses, worms and Trojan horses.
• The most common types of Trojan horses appear as free computer
games and free screensaver program that can be downloaded from
the internet. When a user installs one (1) of these program, the Trojan
horse secretly installs a virus on the computer system
Denial of service
• – A denial of service attack attempts to slow
down or stop a computer system or network
by flooding a computer or network with
request for information and data.
• The target of these attacker is usually internet
service provider (ISP) and specific websites.
Once under attack, the server at the ISP or the
website become overwhelmed with these
request for service and are unable to respond
to legitimate users. As a result, the ISP or
website is effectively shut down
Roque Wi-Fi hotspot
• Rogue WI-FI hotspots imitate these free
networks. These rogue network operate close
to legitimate free hotspots and typically
provide strong signal that many users
unsuspectingly connect to. Once connected,
the rogue networks capture any and all
information sent by the users to legitimate
sites including username and password.
Identity Theft
• Identity thieves look for anything that can help
them steal someone’s identity, from Social Security
number and date of birth, to account information
and passwords. Sometimes they gain this
information from social networking sites, where
users often post detailed personal information such
as their birth dates, family member names, home
addresses, and many more

• The best defense against identity thieves is to


exercise caution when providing information on
social networking sites and use the privacy settings
and controls that are provided at the social
networking sites.
Internet scam
• A scam is a fraudulent or deceptive act or operation designed to trick
individuals into providing personal information or spending their time and
money for little or no return. An Internet scam is simply a scam using the
Internet. Almost Internet scams are initiated by a mass mailing to
unsuspecting individuals.
Phishing
• Phishing is a term used to
describe a malicious individual
or group of individuals who are
scam users. They do that by
submitting e-mails or designing
web pages designed to capture
online bank, credit card, or
other login information. Since
these e-mails and websites
seem like official
Measures to Protect Computer Security
• Restricting Access - Access can be restricted through biometric
scanning devices and passwords, use secret words or phrases. Use
security suites, firewalls, and password managers help with security
tasks.

• Encrypting data - The solution is encryption, the process of coding


information to make it unreadable except to those who have a special
piece of information known as an encryption key, or, simply, a key
Some common uses of encryption include the
following:
• Hypertext transfer protocol secure (https)
requires browsers and websites to encrypt
all messages
• Virtual private networks (VPNs) encrypt
connections between company networks
and remote users.
• WPA2 (Wi-Fi Protected Access) is the most
widely used wireless network encryption
for home wireless networks
Anticipating Disaster
• Companies or individuals should be preparing themselves for
disasters by ensuring physical security and data security through a
disaster recovery plan
• Physical security is concerned with protecting hardware from possible human
and natural disasters
• Data security is concerned with protecting software and data from
unauthorized tampering or damage.
Prevent data loss
• Making frequent backups of data is essential to prevent data loss.
Backups are often stored at an off-site location to protect data in case
of theft, fire, flood, or other disasters.

• Incremental backups store multiple versions of data at different


points in time to prevent data loss due to unwanted changes or
accidental deletion.
REFERENCES
• O’Leary, T., O’Leary L., and O’Leary D. (2017). Computing essentials
2017. USA: McGraw-Hill Education
• Wempen, F. (2014). Computing Fundamentals Digital Literacy Edition.
United Kindgom: John Wiley & Sons, Ltd.

Electronic Sources:
• Retrieved from. https://www.computerhope.com
Question?
END OF PRESENTATION

You might also like