INTRODUCTION As people use computers for a variety of purposes, confidential information, confidential communications, and personal choices can be registered in a variety of ways. Internet privacy is a broad term referring to the various concerns, technologies, and strategies for protecting information, communications, and choices that are meant to be private.
If you choose to shop online, use social networking sites, play online games, or participate in forums, Internet privacy can become an issue in a number of ways. If your passwords are exposed, your identity can be fraudulently used or even stolen. If your contact information is passed around, you may be subject to spam.
If your browsing history becomes public, people will know what you’ve been looking at online. Fortunately, taking certain precautions can reduce the privacy risks that you face.
Strong passwords that are kept secret are one way to safeguard your Internet privacy. The strongest passwords have certain characteristics: they have no personal information, they don’t use real words, they combine upper and lowercase characters with numbers, and they are at least eight characters long. It is important to note, however, that the strongest password does no good if someone else can access it.
Browser privacy settings, which control elements like storage of your browsing and download history and the acceptance of cookies, are there for you to alter to meet your preferences Similarly, social networking sites have settings to allow you to control the level of privacy of various postings you may make.
Note that the default settings may be skewed towards the public exposure of information rather than towards Internet privacy. Facebook has been criticized on this point.
For some sites , make sure you read the privacy terms before signing up. In that, your main choice usually is to become a participant, often with an email address attached to your user name, which may or may not be your real name. As an alternative, you may be able to take advantage of guest privileges, if they are offered, or be limited to reading, but not posting.
Accidental violation of Internet privacy can also occur. This would be the case if somebody accidentally or unthinkingly forwarded an email to multiple parties that was only meant for one person, or neglected to omit a personal comment from the sender before resending. Though this can best be avoided by rigorously separating work and personal emails, this is not always a practical solution. Careful attention and discretion are the only real safeguards.
Internet privacy: why it isimportant Teens and young adults are the most creative users. Personal information : Name, Address, etc… Technology increases risk. 28th jan 2008 celebrates Data privacy day.
Privacy : what is it ? Privacy is the right or oppurtunity to decide who has to access to your personal information.
You can’t get something fornothing The cost of social networking You may participate in all social networking in free but ….. You have to provide personal information.
Profits from info. Website operaters Companies want to sell you things Mobile companies
Ways to protect your privacy Use of age and identity verification. Use services that allow you to report inappropriate content.
Adjust privacy settings Adjust your privacy settings. Use of https. Double security standards. Use of strong passwords.
solutions….. cookie control anti virus software firewalls encryption tools
Two absolute choices Raise awareness of privacy Learn to safeguard your privacy with minimum sacrifice of your convinence
Security for privacy Internet security is a branch of internet privacy specifically related to the Internet often involving browser security The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.
Types of Internet security Network layer security Ipsec protocol Biometric security
Network layer security IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet.
Ipsec protocol This protocol is designed to protect communication in a secure manner using IP. It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography.
To protect the content, the data is transformed using encryption techniques. There are two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and Encapsulating Security Payload (ESP).
Biometric security Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Computer science, biometrics to be specific, is used as a form of identification and access control.
Forms or types… Palm check Retina check Heartbeat and pulse rate Finger tips check Voice commands Imagination (under construction)
conclusions…. Internet privacy can be provided upto a limit. Awareness should be increased. Privacy tips should be adopted by net users. latest technology enhances security like cloud computing.