1 / 21

Powerpoint Templates

PRIVACY AND SECURITY IN DIGITAL WORLD. AZLI EIZAZ AFFANDI BIN AB AZIZ MUHAMMAD FITRIHAKIM BIN M.SUHAIRI MUHAMMAD NOAR AHHA BIN MOHD ANDNA N WAN MOHAMAD FARIQ IQBAL BIN WAN MAZLAN. Powerpoint Templates. PRIVACY.

mahola
Download Presentation

Powerpoint Templates

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PRIVACY AND SECURITY IN DIGITAL WORLD AZLI EIZAZ AFFANDI BIN AB AZIZ MUHAMMAD FITRIHAKIM BIN M.SUHAIRI MUHAMMAD NOAR AHHA BIN MOHD ANDNAN WAN MOHAMAD FARIQ IQBAL BIN WAN MAZLAN Powerpoint Templates

  2. PRIVACY Privacy can be define as the right to have control over some information such as personal and health which is need properly collected and store Privacy in digital world can divided into seven types, that are: ->Privacy of person -> Privacy of behaviour and action -> Privacy of communication -> Privacy of data and image -> Privacy of though and feeling ->Privacy of location and space ->Privacy of association

  3. Privacy of Person Have the right to keep the body function and body characteristic such as genetic codes and biometric privately Privacy of Behaviour and Action It about sensitive issue such as sexual preference and habit, political activities and religious practices among people Privacy of Communication It is aim to avoid the interception of communication, including mail interception, the use of bugs, directional microphones, telephone or wireless communication interception or recording and access to email messages

  4. Privacy of Data and Image Concern to make sure that individual’s information not automatically available to individual and organization . They can have exercise a substantial degree of control over that data ant its use. Privacy of Thought and Feeling Referring to the right not to share though or feeling or to have those thought or feeling revealed. Individual should have right to do whatever they like Privacy of Locations and Space That mean, people have right to move where ever they go, public or semi-public space without being identified, tracked or monitored

  5. Privacy of Association (Including group privacy) is concerned with people’s right to associate with whomever they wish, without being monitored http://www.computerweekly.com/opinion/Privacy-concerns-in-the-digital-world

  6. SECURITY IN DIGITAL WORLD

  7. Security ->>Security is a protection against threat that is related to malicious human activities ->>Not just in the case of physical security measure, digital security solution must be chosen with the level of threat and its potential harm ->>Digital security aim to protect against non-exhaustive threats. Such as : ~Identity theft ~Fraud in financial transaction ~Destruction of data ~Infringement of intellectual property ~Confidentiality breaches ~Intrusion in digital system

  8. Objectives of Digital Security are: • To Secure authenticate an object or a person • To securely store data • To securely transfer information from different place • To securely execute application Security Action • Authentication • Data Protection • Secure Communication • Trusted Execution

  9. BENEFITS

  10. Computers and the internet • Telecommunication • Financial Transaction • Travel and transportation • Health care

  11. Computer and Internet • Protected by Antivirus / Firewall • Secure browsing • Personal information and data can be store safely

  12. Financial transaction • Secure transaction • Encryption • Layered protection • HTTPS • SSL (secure socket layer)

  13. ADVANTAGE AND DISADVANTAGE

  14. Advantages • Privacy protected-all your info will be private only you and admin can see. • Receive first hand information-get information faster and only you get it first. • Prevent from be hacking-give protection for the person been hack by any hacker. • Prevent of losing info-all data that been stored will be keep safely.

  15. Disadvantages • Privacy invasion-it easy to be tracking our activity because it is morally wrong. • Privacy policy-we just easily agree without reading detail. • A lot of identity fraud / thief-we can make a lot of fake account that give disadvantages. • Can be used for unwanted stuffcan be used for not got activity like cyber bullying.

  16. SUCCESS STORY

  17. CyberSecurity Malaysia • Began on the 13th of January 1997 • Known as National ICT Security & Emergency Response Centre (NISER) • 24th of January 1998 NISER was created as a department within MIMOS • NISER was taken out from MIMOS and change into national cyber security under MOSTI • 2006, during first NITC meeting, government decided to implement National Cyber Security Policy (NCYP) • NISER was renamed CyberSecurity Malaysia. On the 20th of August 2007

  18. Milestones

  19. IBM • Early 1970s – first company in the world to adopt a global privacy code of conduct • 2000 – one of the first companies of any size to appoint a chief privacy officer • 2005 – first company to adopt a global genetic nondiscrimination and privacy policy • 2012 – recognized as one of the top 10 companies “Most Trusted for Privacy” by US consumers for the seventh consecutive year

  20. In 2012, IBM build a globally recognized enterprise privacy program that follows Privacy by Design practices • Throughout 2012, IBM continued to develop IBMPrivacy

More Related