1 / 19

Privacy and Encryption

COMPUTERS IN YOUR FUTURE 2004. What You Will Learn. Privacy and Encryption. The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused by users

Download Presentation

Privacy and Encryption

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COMPUTERS IN YOUR FUTURE 2004 What You Will Learn Privacy and Encryption • The threat of privacy due to the sale of sensitive personal information on the internet • Definition of anonymity and how it is abused by users • Technological developments and how they are eroding privacy and anonymity • Reasons why employers are monitoring employee’s computer usage • How public-key encryption threatens U.S. security, both foreign and domestic • The U.S. government’s proposed key recovery plan and how it threatens the growth of internet commerce

  2. What is identity theft? • Identity theft is obtaining enough information about an individual to open a credit card account in their name and charging items bought to that account • Examples of information needed are name, address, social security number and other personal information • Laws limit liability to $50 for each fraudulent charge • Affects credit reports

  3. The Internet and privacy • Privacy refers to an individual’s ability to restrict the collection, use and sale of confidential personal information • The Internet is eroding privacy through web sites selling information collected through registration forms • Few laws regulate selling personal information

  4. The Internet and encryption • Encryption refers to the coding of information so that it is only readable by the intended recipient • Used in electronic commerce transactions and e-mail • Provides a way to use the Internet in a safe secure way • Could be used misused by criminals and terrorists

  5. What is anonymity? • Anonymity is the ability to convey a message without disclosing one’s identity • It can be abused because it frees people from accountability • Defamation is the act of injuring someone’s reputation by making false statements • Libel occurs when malicious statements are made in writing

  6. How is technology eroding privacy and anonymity? • Computers and the Internet enable marketing firms, snoops, and government officials to collect information in ways that are hidden from view • Methods used on the Internet are: • Cookies • Global Unique Identifiers (GUIDS)

  7. What are cookies? • Cookies are small files that are written to an individual’s hard drive by web sites visited • Legitimate purposes include recording information for future use; Example: retail sites using “shopping carts” • Questionable practices include banner ad companies tracking a user’s browsing actions and placing banner ads on web sites based on those actions

  8. Examples of cookies

  9. What is a global unique identifier (GUID)? • A GUID is a unique identification number generated by hardware or a program • Used to send user information back to site that created it

  10. Privacy in the workplace • Employees are given e-mail and Internet access at work • Companies concerned over employees wasting time surfing the net and sending personal e-mail • Three-quarters of large corporations monitor employees’ phone calls, e-mail, web browsing habits and computer files • Laws do not protect employees from being monitored

  11. Some things to remember at work Do not use the employer’s phone for personal calls Do not use the employer’s e-mail for personal messages Assume everything you do at work is being monitored

  12. Protecting online privacy Browse anonymously- Use web sites such as www.anonymizer.com or www.the-cloak.com Disable cookies on your web browser Use free e-mail addresses for information placed on web sites Don’t divulge personal information to online strangers Make sure registration forms have a privacy policy statement

  13. What is encryption? • Encryption refers to the coding of information so that it is only readable by the intended recipient • A readable message is called plaintext • Encryption key is a formula used to make plaintext unreadable • Symmetric key encryption algorithms are encryption techniques that use the same key to encrypt and decrypt a message • Data Encryption Standard (DES) is a commonly used encryption system

  14. What is public key encryption? • Public key encryption uses two different keys • Public key is the encryption key • Private key is the decryption key • Used in e-commerce transactions • Provides a secure channel for information • Computationally intensive or it places a heavy burden on the CPU • Vulnerable to cryptanalysis or code breaking • Key length is the length of an encryption key

  15. What are public security issues involving encryption? • Encryption can be used for illegal means as well as legitimate means • Encryption will devastate law enforcements ability to fight crime • Public key encryption can also be used in telephone conversations • Law enforcement agencies are asking for laws enabling them to eavesdrop on encrypted messages • Clipper chip • Key escrow plan • Key recovery

  16. How can you protect your online privacy? Hushmail Email Pretty Good Privacy

  17. Surfing Anonymously

  18. Anonymous Services

  19. THE END

More Related