1 / 17

“Breach of Privacy”

“Breach of Privacy”. Presented by Sumit Yadav. Computer security Aspects. Privacy (confidentiality ) integrity availability . What is privacy?.

saburo
Download Presentation

“Breach of Privacy”

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. “Breach of Privacy” Presented by Sumit Yadav

  2. Computer security Aspects • Privacy (confidentiality ) • integrity • availability

  3. What is privacy? • For citizens and consumers, freedom from unauthorized intrusion. For organizations, privacy involves the policies that determine what information is gathered, how it is used, and how customers are informed and involved in this process. Privacy is a legal issue, but it's also an information security issue .

  4. How your privacy can be breached? • Cookies • Keylooger • spyware (adware)

  5. Cookies • Data files can be store and fetch by remote server • What they can store ? • How you can prevent? • Setting the Privacy level to High in the browser • Zonealarm with new privacy protection feature

  6. Key logger • surveillance tool that records every keystroke • What it is used for ? • Employer monitoring their employees. • Monitoring kids activity • What if it is abused? • Remotely installing key logger • Prevention • Installing anti spy software

  7. Spy ware • Spy ware modules are created by marketers who want to monitor your customer’s browsing habits. • What is ad ware? • Indication of spy ware • Web sites never seen before are suddenly visible. • Strange toolbar • How to protect yourself from spy ware • Installing Spybot and Ad-Aware.

  8. What to do to improve privacy? • Keep your windows up to date by installing critical updates • Back up regularly • Keep security programs up to date • Surf safely • Be vary of attachments • Don’t swallow the spam: go to http://hoaxbusters.ciac.org for list of internet scams. • Check start-up processes-Launch Msconfig(startup) check with www.answerthatwork.com for unfamiliar entries.

  9. What to do to improve privacy? TOR(Open Source Project) • An open-source project, Tor seeks to provide anonymity through a technique called onion routing .Onion routing basically works by implementing numerous routers through which communications will pass. • For more info: (www.freehaven. net/tor)

  10. What if everybody get privacy? • Positive impact • People will be able to surf the web without being traced. • Agents can more easily carry out research and investigations without reveling their identity. • Negative impact • Hacker steal credit card without being caught. • Virus can spread with no knowledge of its origin. • Negative effect on law enforcement making possible for criminals and terrorists to elude the law.

  11. Case Study -Google • Google’s email service (gmail) • Google scan thought your emails and look for keywords • Google target adds on your system according to the keywords it has collected • Google desktop software • Now you can Google your pc • Google desktop can search your Outlook / Outlook Express,websites and other documents • Risk of privacy if it’s a public computer

  12. Gramm Leach Bliley Act (GLBA), • Financial institution must provide customers clear and conspicuous notice about its privacy policies • Institution must provide annual notices of its privacy policies and practices • Financial institution must provide customers with an opportunity to opt out of disclosures of their non-public personal information

  13. HIPPA (Health Care Portability andAccountability Act) • patients’ access to their own medical records • Notice of privacy practices • Limitations on use of personal medical information • Restrictions on marketing medical information • Confidentiality of doctor patient communications

  14. U.S. Privacy Act • Protects the privacy of personal data collected by the government • Allow individuals to determine what data collected and for what purpose • To whom information has been disseminated

  15. U.S. Electronic Communications Privacy Act • Protects against wiretapping • Allows law enforcement agencies to access communicating or records of them • ISP need to install equipments to allow access to agencies • ISP can read content of communicating in order to improve security and integrity

  16. USA Patriot Act • Knowingly causing the transmission of code resulting in damage to a protected computer is an offence • Recklessly causing damage to a computer system as a consequence of unauthorized access is also an offence • Causing damage (even unintentionally) as a consequence of unauthorized access to a protected computer is a crime

  17. Reference • Pfleeger, Charles and Pfleeger, Shari. “Security in Computing.” • http://search.epnet.com/login.aspx?direct=true&AuthType=cookie,ip,url,uid&db=cph&an=14332860 • http://search.epnet.com/login.aspx?direct=true&AuthType=cookie,ip,url,uid&db=cph&an=13669005 • http://search.epnet.com/login.aspx?direct=true&AuthType=cookie,ip,url,uid&db=cph&an=11070935 • http://search.epnet.com/login.aspx?direct=true&AuthType=cookie,ip,url,uid&db=cph&an=4110997

More Related