INTERNET PRIVACY

848 views
801 views

Published on

All about internet privacy n cyber world !!!

Published in: Technology, News & Politics
2 Comments
3 Likes
Statistics
Notes
No Downloads
Views
Total views
848
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
2
Likes
3
Embeds 0
No embeds

No notes for slide

INTERNET PRIVACY

  1. 1. INTRODUCTION As people use computers for a variety of purposes, confidential information, confidential communications, and personal choices can be registered in a variety of ways. Internet privacy is a broad term referring to the various concerns, technologies, and strategies for protecting information, communications, and choices that are meant to be private.
  2. 2.  If you choose to shop online, use social networking sites, play online games, or participate in forums, Internet privacy can become an issue in a number of ways. If your passwords are exposed, your identity can be fraudulently used or even stolen. If your contact information is passed around, you may be subject to spam.
  3. 3.  If your browsing history becomes public, people will know what you’ve been looking at online. Fortunately, taking certain precautions can reduce the privacy risks that you face.
  4. 4.  Strong passwords that are kept secret are one way to safeguard your Internet privacy. The strongest passwords have certain characteristics: they have no personal information, they don’t use real words, they combine upper and lowercase characters with numbers, and they are at least eight characters long. It is important to note, however, that the strongest password does no good if someone else can access it.
  5. 5.  Browser privacy settings, which control elements like storage of your browsing and download history and the acceptance of cookies, are there for you to alter to meet your preferences Similarly, social networking sites have settings to allow you to control the level of privacy of various postings you may make.
  6. 6.  Note that the default settings may be skewed towards the public exposure of information rather than towards Internet privacy. Facebook has been criticized on this point.
  7. 7.  For some sites , make sure you read the privacy terms before signing up. In that, your main choice usually is to become a participant, often with an email address attached to your user name, which may or may not be your real name. As an alternative, you may be able to take advantage of guest privileges, if they are offered, or be limited to reading, but not posting.
  8. 8.  Accidental violation of Internet privacy can also occur. This would be the case if somebody accidentally or unthinkingly forwarded an email to multiple parties that was only meant for one person, or neglected to omit a personal comment from the sender before resending. Though this can best be avoided by rigorously separating work and personal emails, this is not always a practical solution. Careful attention and discretion are the only real safeguards.
  9. 9. Internet privacy: why it isimportant Teens and young adults are the most creative users. Personal information : Name, Address, etc… Technology increases risk. 28th jan 2008 celebrates Data privacy day.
  10. 10. Privacy : what is it ? Privacy is the right or oppurtunity to decide who has to access to your personal information.
  11. 11. You can’t get something fornothing The cost of social networking You may participate in all social networking in free but ….. You have to provide personal information.
  12. 12. Profits from info. Website operaters Companies want to sell you things Mobile companies
  13. 13. Ways to protect your privacy Use of age and identity verification. Use services that allow you to report inappropriate content.
  14. 14. Adjust privacy settings Adjust your privacy settings. Use of https. Double security standards. Use of strong passwords.
  15. 15. Privacy policy should provide Notice Choice Access Security
  16. 16. Security risks Passwords File sharing Spyware Phishing Updating
  17. 17. solutions….. cookie control anti virus software firewalls encryption tools
  18. 18. Two absolute choices Raise awareness of privacy Learn to safeguard your privacy with minimum sacrifice of your convinence
  19. 19. Security for privacy Internet security is a branch of internet privacy specifically related to the Internet often involving browser security The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.
  20. 20. Types of Internet security Network layer security Ipsec protocol Biometric security
  21. 21. Network layer security IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet.
  22. 22. Ipsec protocol This protocol is designed to protect communication in a secure manner using IP. It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography.
  23. 23.  To protect the content, the data is transformed using encryption techniques. There are two main types of transformation that form the basis of IPsec: the Authentication Header (AH) and Encapsulating Security Payload (ESP).
  24. 24. Biometric security Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits. Computer science, biometrics to be specific, is used as a form of identification and access control.
  25. 25. Forms or types… Palm check Retina check Heartbeat and pulse rate Finger tips check Voice commands Imagination (under construction)
  26. 26. conclusions…. Internet privacy can be provided upto a limit. Awareness should be increased. Privacy tips should be adopted by net users. latest technology enhances security like cloud computing.

×