1 / 17

Chapter 7: Privacy, Crime, and Security

Chapter 7: Privacy, Crime, and Security. Prepared by: T. Ibtissem Ajmi. Privacy in Cyberspace. Privacy: an individual’s ability to restrict or eliminate the collection, use and sale of confidential personal information The problem: collection of information without consent

yosef
Download Presentation

Chapter 7: Privacy, Crime, and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 7: Privacy, Crime, and Security Prepared by: T. Ibtissem Ajmi

  2. Privacy in Cyberspace • Privacy: an individual’s ability to restrict or eliminate the collection, use and sale of confidential personal information • The problem: collection of information without consent • Anonymity: the ability to convey a message without disclosing your name or identity T. Ibtissem Ajmi

  3. Privacy in Cyberspace • Cookies: small files that are written to your computer’s hard disk by many of the Web sites you visit T. Ibtissem Ajmi

  4. Privacy in Cyberspace Cookies are text files stored in the Temporary Internet Files folder. T. Ibtissem Ajmi

  5. Privacy in Cyberspace • Global Unique Identifier (GUID): an identification number that is generated by a hardware component or a program T. Ibtissem Ajmi

  6. Protecting Your Privacy • Browse anonymously by surfing from www.anonymizer.com • Disable cookies on your Web browser • Use a free e-mail address to place on Web pages, mailing lists, chat rooms, or other public Internet spaces • Do not fill out site registration forms unless you see a privacy statement indicating that the information gathered will not be sold to 3rd parties T. Ibtissem Ajmi

  7. Types of Computer Crime • Identity Theft • Computer Virus: a hidden code within a program that may damage or destroy infected files • Example: Typically, virus infections spread when an infected file or program is downloaded onto a computer . When the program is executed, the viruses spreads to other programs on the user s hard disk. If you copy a file on your computer to a USB drive, CD, or DVD and give it to someone, the infection spreads even further. • Time Bomb (Logic Bomb): a virus that sits harmlessly on a system until a certain event causes the program to become active T. Ibtissem Ajmi

  8. Types of Computer Crime • Worm: a program that can spread from one computer to another and can propagate over a computer network • Trojan Horse: a rogue program disguised as a useful program but contains hidden instructions to perform a malicious task instead T. Ibtissem Ajmi

  9. Types of Computer Crime • Salami Shaving: a method that a programmer alters a program to subtract a very small amount of money from an account and divests the funds to the embezzler’s account • Data Diddling: a method that insiders modify data by altering accounts or database records so that it is difficult to tell that they have stolen funds or equipments • Forgery: a method that a user makes Internet data appear to come from one place when it is really coming from another • Blackmail T. Ibtissem Ajmi

  10. Attackers • Hackers, Crackers (Black hats), Cybergangs, Virus Authors, Ethical Hackers (White Hats) • Swindlers • Shills T. Ibtissem Ajmi

  11. Security Risks • Wireless Network • War Driving: an individual drives around with a wireless device to look for wireless networks • Corporate Espionage: the unauthorized access of corporate information, usually to the benefit of a competitor • Information Warfare: the use of information technologies to corrupt or destroy an enemy’s information and infrastructure • Security Loophole Detection Program: a program that automatically search for unprotected or poorly protected computers T. Ibtissem Ajmi

  12. Protecting Computer Systems • Power-Related Problems: by using Uninterruptible Power Supply (UPS) • Controlling Access: by using password authentication, know-and-have authentication, or biometric authentication • Firewall: a computer program or device that permits an organization’s internal computer users to access the external Internet but severely limits the ability of outsiders to access internal data T. Ibtissem Ajmi

  13. Protecting Computer Systems • Avoiding Scams • Preventing Cyber stalking T. Ibtissem Ajmi

  14. Encryption • Encryption: a coding or scrambling process that renders a message unreadable by anyone except the intended recipient • Public Key Encryption • Encryption Key (Public Key) • Decryption Key (Private Key) T. Ibtissem Ajmi

  15. Encryption • Digital Signature: a technique that guarantees a message has not been tampered with

  16. Encryption • Digital Certificate: a technique for validating one’s identity

  17. Encryption • Public Key Infrastructure (PKI): a uniform set of encryption standards that specify how public key encryption, digital signatures, digital certificates should be implemented in computer systems and on the Internet T. Ibtissem Ajmi

More Related