privacy and the internet l.
Skip this Video
Loading SlideShow in 5 Seconds..
Privacy and the Internet PowerPoint Presentation
Download Presentation
Privacy and the Internet

Loading in 2 Seconds...

play fullscreen
1 / 13

Privacy and the Internet - PowerPoint PPT Presentation

  • Uploaded on

Privacy and the Internet By, Rachel Hoeschen Table of Contents The Threats Cookies Web bugs Browsers Spy ware Phishing Your info Spam What can you do about it? Sources Threats to Your Privacy The Biggies….. Cookies Web Bugs Browsers Spy ware Phishing Your Information Spam

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Privacy and the Internet' - Gideon

Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
privacy and the internet

Privacy and the Internet


Rachel Hoeschen

table of contents
Table of Contents
  • The Threats
      • Cookies
      • Web bugs
      • Browsers
      • Spy ware
      • Phishing
      • Your info
      • Spam
  • What can you do about it?
  • Sources
threats to your privacy the biggies
Threats to Your Privacy The Biggies…..


Web Bugs


Spy ware


Your Information


cookies or http cookies far from the cookie monsters favorite treat
Cookies or HTTP CookiesFar from the cookie monsters favorite treat
  • Data that is inserted on your hard drive that stores information about previously visited web sites
    • they tailor web sites based on your interests

. Most are used only by the web site that put the cookie in place but….

The elusive

Third-Party Cookies, gather information about you and then sells that data to other marketers

Cookies in the News

web bugs creepy crawlers that gather your information
Web bugsCreepy Crawlers that gather your information
  • These allow third parties to see who is looking at a web page of message.
  • They can be used to confirm that a message or web page is being viewed and then record the IP address of the viewer.
  • Exterminate them by
      • by reading your email while offline
      • installing a software program that detects web bugs.                      
browsers browsing through your personal information as you read
Browsersbrowsing through your personal information as you read
  • They invisibly provide web site operators with information about your ISP and past web sites you have visited
  • Some web browsers, may also be tricked into reporting the user's default e-mail address, phone number, and other information found in your address book
  • The major browsers affected are Netscape Navigator and Microsoft Internet Explorer.
spy ware not the james bond you know and trust
Spy wareNot the James Bond you know and trust
  • Malicious software designed to intercept or take partial control of a computer's operation without the informed

consent of that machine's owner or legitimate user.

  • It exploits infected computers for commercial gain. Such as pop- ups advertisements; theft of personal information, monitoring of Web-browsing activity for marketing purposes; or routing of HTTP requests to advertising sites.
  • As of 2005, spy ware has become one of the pre-eminent security threats to computer-systems running Microsoft Windows operating- systems and Internet Explorer.
phishing fishing for your information
PhishingFishing for your information
  • An email that looks official but is actually trying to trick the bank's members into giving away their account information by "confirming" sensitive information at the phisher's linked website.
your famous but in the john bobbitt way
Your Famous!But in the John Bobbitt way
  • With out your permission anyone can say what they want about you on the internet
  • Governments, schools, businesses and other organizations collect and may publish your personal information
  • They may also sell this info to businesses

or individuals

  • There is little or no law anywhere in the world governing this
spam the other other other white meat
SpamThe other, other, other white meat
  • junk e-mail
  • public sources (such as web sites online purchases and can be harvested for e-mail addresses)
  • These are then sold to spammers. Or spammers use programs to randomly generate e-mail addresses.
  • To much spam can compromise and slow down the whole network.
  • Annoying!
  • FYI: Spam is now illegal in Australia.
feeling taken advantage of yet what are you going to do about it
Feeling taken advantage of yet?What are you going to do about it?

1. Only conduct business, visit sites or become involved with web sites that have adequate privacy policies that cover at least: to whom your information will be passed onto, why the information is being collected, how the information will be used, and how you can access information the organization holds about you

2. Install and use privacy enhancing software including:

  • Firewall
  • Cookie Remover
  • Web Bug Remover
  • Anonymous Web Browsing
  • Encrypted Email
  • Advertising Filters
  • Anti-Spam Tools
  • Anti-Spyware Tools
  • Further Information

3. Opt out of all further contact with organizations

4. Only give as much personal information as you are comfortable with

5. Use an on-line identity and free email service to protect against giving out your details to spammers

don t forget
Don’t Forget!

The workplace


Law Enforcement

What does privacy mean to them?