Protecting Personal Privacy
Upcoming SlideShare
Loading in...5
×
 

Protecting Personal Privacy

on

  • 187 views

 

Statistics

Views

Total Views
187
Views on SlideShare
187
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Protecting Personal Privacy Protecting Personal Privacy Presentation Transcript

  • PROTECTING PERSONAL PRIVACY Securing Your Online Information http://www.life123.com/career-money/credit- debt/identity-theft/common-identity-theft- scams.shtml
  • How safe is your information on the web?• As technology advances, information becomes easier and faster to send between locations. This convenience is nice, but security becomes paramount in guaranteeing that private information is not accessed by unauthorized viewers. https://blog.facebook.com/blog.php?post=4 13846952130
  • Personal information can be disclosed on all kinds of websites• Social Media Sites: Facebook, Twitter, Myspace, etc.• Purchasing Websites: Amazon, E-Bay, etc.• Any other website that requires creating an account• Other parties may not even have to put in any effort to gather information. Depending on settings, the user may have all their information already displayed. *This is a fake profile View slide
  • What can they do with your information?• Use it to access other personal accounts• Identity theft, reputation damage• Sell your information to other parties• Blackmail, bribery http://www.wikinvest.com/concept/Identity_Theft View slide
  • Some information should never be given out unless you know the source is completely trustworthy• Social Security Number• Credit Card Numbers• Account passwords• Addresses and Phone Numbers http://issbs.com/how-to-find-the-best-option-in- credit-cards-2/
  • Methods used to access personal information• Phishing• Spyware/Malware• Hacking• Simple searches http://ant.sillydog.org/blog/2004/000293.php
  • You may not even know your information is compromised until its too late• Universities have been targets for ID thieves• One attack went unnoticed for over a year• No U.S. law was implemented requiring the university to notify individuals that their information had been stolen http://en.wikipedia.org/wiki/Ohio_University
  • Apprehending violators is difficult• Anonymity adds to difficulty• Victims must spend time and $$ to attempt to correct the situation• Law enforcement, government and credit industries add complications to resolving the situation in a timely manner http://appraisalnewsonline.typepad.com/appraisal_n ews_for_real_e/identity_theft/
  • However, there are punishments for those caught committing these crimes• State laws vary, but federal laws have begun to crack down on identity theft related crimes• Identity Theft Penalty Act raises max sentence from 3 to 5 years in prison with additional years depending on the specific crime http://www.cybercrimesunit.com/?p=374
  • Simple Steps to Protect Your Online Information• Never give out your information to people you do not know or trust• Be sure to have all your essential programs updated to their current release• Use secure passwords for accounts• Have antivirus and spyware/malware programs installed and enabled• Keep other electronic http://simpleit1.tech.officelive.com/ProtectionSoftware.aspx devices with links to personal accounts secure
  • Useful Computer Programs• CCleaner: http://www.piriform.com/ccleaner• MalwareBytes: http://www.malwarebytes.org/• NoScript(If using Mozilla Firefox browser): http://noscript.net/• Antivirus Programs and more: o AVG: http://free.avg.com/us-en/homepage o Nod32: http://www.eset.com/us/ o Avast!: http://www.avast.com/en-us/index o Aviria: http://www.avira.com/en/index o Comodo: http://www.comodo.com/ o Norton: http://www.symantec.com/index.jsp