1 / 13

Privacy and the Internet

Privacy and the Internet By, Rachel Hoeschen Table of Contents The Threats Cookies Web bugs Browsers Spy ware Phishing Your info Spam What can you do about it? Sources Threats to Your Privacy The Biggies….. Cookies Web Bugs Browsers Spy ware Phishing Your Information Spam

Gideon
Download Presentation

Privacy and the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy and the Internet By, Rachel Hoeschen

  2. Table of Contents • The Threats • Cookies • Web bugs • Browsers • Spy ware • Phishing • Your info • Spam • What can you do about it? • Sources

  3. Threats to Your Privacy The Biggies….. Cookies Web Bugs Browsers Spy ware Phishing Your Information Spam

  4. Cookies or HTTP CookiesFar from the cookie monsters favorite treat • Data that is inserted on your hard drive that stores information about previously visited web sites • they tailor web sites based on your interests . Most are used only by the web site that put the cookie in place but…. The elusive Third-Party Cookies, gather information about you and then sells that data to other marketers Cookies in the News

  5. Web bugsCreepy Crawlers that gather your information • These allow third parties to see who is looking at a web page of message. • They can be used to confirm that a message or web page is being viewed and then record the IP address of the viewer. • Exterminate them by • by reading your email while offline • installing a software program that detects web bugs.                      

  6. Browsersbrowsing through your personal information as you read • They invisibly provide web site operators with information about your ISP and past web sites you have visited • Some web browsers, may also be tricked into reporting the user's default e-mail address, phone number, and other information found in your address book • The major browsers affected are Netscape Navigator and Microsoft Internet Explorer.

  7. Spy wareNot the James Bond you know and trust • Malicious software designed to intercept or take partial control of a computer's operation without the informed consent of that machine's owner or legitimate user. • It exploits infected computers for commercial gain. Such as pop- ups advertisements; theft of personal information, monitoring of Web-browsing activity for marketing purposes; or routing of HTTP requests to advertising sites. • As of 2005, spy ware has become one of the pre-eminent security threats to computer-systems running Microsoft Windows operating- systems and Internet Explorer.

  8. PhishingFishing for your information • An email that looks official but is actually trying to trick the bank's members into giving away their account information by "confirming" sensitive information at the phisher's linked website.

  9. Your Famous!But in the John Bobbitt way • With out your permission anyone can say what they want about you on the internet • Governments, schools, businesses and other organizations collect and may publish your personal information • They may also sell this info to businesses or individuals • There is little or no law anywhere in the world governing this

  10. SpamThe other, other, other white meat • junk e-mail • public sources (such as web sites online purchases and can be harvested for e-mail addresses) • These are then sold to spammers. Or spammers use programs to randomly generate e-mail addresses. • To much spam can compromise and slow down the whole network. • Annoying! • FYI: Spam is now illegal in Australia.

  11. Feeling taken advantage of yet?What are you going to do about it? 1. Only conduct business, visit sites or become involved with web sites that have adequate privacy policies that cover at least: to whom your information will be passed onto, why the information is being collected, how the information will be used, and how you can access information the organization holds about you 2. Install and use privacy enhancing software including: • Firewall • Cookie Remover • Web Bug Remover • Anonymous Web Browsing • Encrypted Email • Advertising Filters • Anti-Spam Tools • Anti-Spyware Tools • Further Information 3. Opt out of all further contact with organizations 4. Only give as much personal information as you are comfortable with 5. Use an on-line identity and free email service to protect against giving out your details to spammers

  12. Don’t Forget! The workplace Children Law Enforcement What does privacy mean to them?

  13. Sources http://en.wikipedia.org/wiki/Internet_privacy http://www.privacyrights.org/fs/fs18-cyb.htm http://www.privacy.gov.au/internet/internet_privacy/#2 http://www.privacy.gov.au/internet/tools/index.html http://www.privacy.org/ http://www.ftc.gov/bcp/conline/edcams/kidzprivacy/ http://www.sonic.net/~undoc/extent.htm

More Related