• Save
INTERNET PRIVACY
Upcoming SlideShare
Loading in...5
×
 

INTERNET PRIVACY

on

  • 437 views

All about internet privacy n cyber world !!!

All about internet privacy n cyber world !!!

Statistics

Views

Total Views
437
Views on SlideShare
437
Embed Views
0

Actions

Likes
3
Downloads
3
Comments
2

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

INTERNET PRIVACY INTERNET PRIVACY Presentation Transcript

  • INTRODUCTION As people use computers for a variety of purposes, confidential information, confidential communications, and personal choices can be registered in a variety of ways. Internet privacy is a broad term referring to the various concerns, technologies, and strategies for protecting information, communications, and choices that are meant to be private.
  •  If you choose to shop online, use social networking sites, play online games, or participate in forums, Internet privacy can become an issue in a number of ways. If your passwords are exposed, your identity can be fraudulently used or even stolen. If your contact information is passed around, you may be subject to spam.
  •  If your browsing history becomes public, people will know what you’ve been looking at online. Fortunately, taking certain precautions can reduce the privacy risks that you face.
  •  Strong passwords that are kept secret are one way to safeguard your Internet privacy. The strongest passwords have certain characteristics: they have no personal information, they don’t use real words, they combine upper and lowercase characters with numbers, and they are at least eight characters long. It is important to note, however, that the strongest password does no good if someone else can access it.
  •  Browser privacy settings, which control elements like storage of your browsing and download history and the acceptance of cookies, are there for you to alter to meet your preferences Similarly, social networking sites have settings to allow you to control the level of privacy of various postings you may make.
  •  Note that the default settings may be skewed towards the public exposure of information rather than towards Internet privacy. Facebook has been criticized on this point.
  •  For some sites , make sure you read the privacy terms before signing up. In that, your main choice usually is to become a participant, often with an email address attached to your user name, which may or may not be your real name. As an alternative, you may be able to take advantage of guest privileges, if they are offered, or be limited to reading, but not posting.
  •  Accidental violation of Internet privacy can also occur. This would be the case if somebody accidentally or unthinkingly forwarded an email to multiple parties that was only meant for one person, or neglected to omit a personal comment from the sender before resending. Though this can best be avoided by rigorously separating work and personal emails, this is not always a practical solution. Careful attention and discretion are the only real safeguards.
  • Internet privacy: why it isimportant Teens and young adults are the most creative users. Personal information : Name, Address, etc… Technology increases risk. 28th jan 2008 celebrates Data privacy day.
  • Privacy : what is it ? Privacy is the right or oppurtunity to decide who has to access to your personal information.
  • You can’t get something fornothing The cost of social networking You may participate in all social networking in free but ….. You have to provide personal information.
  • Profits from info. Website operaters Companies want to sell you things Mobile companies
  • Ways to protect your privacy Use of age and identity verification. Use services that allow you to report inappropriate content.
  • Adjust privacy settings Adjust your privacy settings. Use of https. Double security standards. Use of strong passwords.
  • Privacy policy should provide Notice Choice Access Security
  • Security risks Passwords File sharing Spyware Phishing Updating
  • solutions….. cookie control anti virus software firewalls encryption tools
  • Two absolute choices Raise awareness of privacy Learn to safeguard your privacy with minimum sacrifice of your convinence
  • Security for privacy Internet security is a branch of internet privacy specifically related to the Internet often involving browser security The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.
  • Types of Internet security Network layer security Ipsec protocol Biometric security
  • Network layer security IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet.
  • Ipsec protocol This protocol is designed to protect communication in a secure manner using IP. It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography.
  •  To protect the content, the data is transformed using encryption techniques. There are two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and Encapsulating Security Payload (ESP).
  • Biometric security Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Computer science, biometrics to be specific, is used as a form of identification and access control.
  • Forms or types… Palm check Retina check Heartbeat and pulse rate Finger tips check Voice commands Imagination (under construction)
  • conclusions…. Internet privacy can be provided upto a limit. Awareness should be increased. Privacy tips should be adopted by net users. latest technology enhances security like cloud computing.