SlideShare a Scribd company logo
1 of 26
Hamimah bte Mohd Jamil




MUHAMMAD BIN MOHD SUKERI
(A13CS0068)
NURUL EMIRA BINTI ABDUL AZIZ
(A13CS0128)
WAN HAJARUL ASIKIN BINTI WAN
ZUNAIDI (A13CS0168)
PRIVACY
• Computing technology makes it possible to
collect and use our data.
• The website we visit is one of the way the data
collection.
• Would you matter if your personal
information is been shared ?
PRIMARY
PRIVACY
ISSUES

ACCURACY :Relates to the responsibility of those who collect the data is
correct
PROPERTY :who on data and right to the software
ACCESS :relates to the responsibility of those who have data to control who
is able to use it
LARGE DATABASE
• Large organisation are constantly compiling
information about us.
• There are about 2000 database
• Example : Telephone companies-compile lists of
the call we make.
• REVERSE DIRECTORY
list telephone
number followed by subscriber names.
• *insert picture
• *change title
• Information reseller(information broker) : Collect
and sell personal data. Electronic Profiles : are
compiled from database to provide highly detailed
and personalized descriptions of individual
• Our personal information has been a marketable
commodity. This raises many issues including :
1.COLLECTING PUBLIC,BUT PERSONALLY IDENTIFYING
INFORMATION.

2.SPREADING INFORMATION WITHOUT PERSONAL
CONSENT.

3.SPREADING INACCURATE INFORMATION
IDENTITY THEFT :
• Is the illegal assumption of someone’s
identity for the purpose of economic gain.

MISTAKEN IDENTITY :
• Occurs when an electronic profile of one
person is switched with another.
• INFORMATION OF INFORMATION ACT :
entitles individuals access to
governmental records relating to them.
Many organization monitor employee e-mail and
computer files using software called SNOOPWARE
Many people believe that, while using the web, little
can be done to invade their privacy. This is called the
illusion of anonymity
Record location of visited sites

Two basic type are TRADITIONAL COOKIES AND AD
NETWORK COOKIES(ADWARE COOKIES).
• TRADITIONAL COOKIES-Provide information to a single sites,a
cookies is deposited with the information that identifies specifically
• AD NETWORK(ADWARE COOKIES-Record your activities across
different sites.
• PRIVACY MODE(INPRIVATE BROWSING;PRIVATER BROWSING)eliminate history files and block cookies.
• SPYWARE-Secretly record and report internet activities.
• COMPUTER MONITORING(KEYSTROKE LOGGERS)-watches what
you do.
• WEB BUGS-Provide information back to spammers about activity
on e-mail account.
• ANTISPYWARE(SPY REMOVAL PROGRAM)-detect Web bug and
monitoring software.
GRAMM-LEACH-BLILEY ACT

• Protect personal financial information
HEALTH INSURANCE PROTABILITY AND
ACCOUNTABILITY ACT(HIPAA)

• Protect medical records
FAMILY EDUCATIONAL RIGHTS AND PRIVACY
ACT(FREPA)

• Restricts disclosure of educational records
• Computer criminal included employee , outside
users , hacker and crackers ,carders , organized
crime, and terrorist
• HACKER :Create or improve programs and shared
those program with fellow hackers . Typically are
not criminal.
• CRACKERS :Share programs designed to gain
unauthorized access computer systems or disrupt
networks.Typically are criminals.
• CARDERS :Specialize in stealing,trading and using
stolen credit cards over the internet.
Is an illegal action involving special knowledge
of computer technology
• CYBER-BULLYING : intended to hurt or embarrass
another person.
• ROGUE WI-FI HOTSPOT :Capture personal
information
• SCAMS : designed to trick people into spending
their time/money.
• DENIAL OF SERVICE ATTACK(DOS) : Is attempt to
shut down or stop a computer system/network.it
floods a computer or network with requests for
information and data.
• Theft : Takes many forms including stealing
hardware, software, data and computer time.
• Data manipulation : Involves changing data or
leaving prank messages .The Computer Fraud and
Abuse Act helps protect against data manipulation.
• MALICIOUS PROGRAMS (MALWARE) : Design to damage or
disrupt computer system.3 most common types of malware
are viruses, worms, and Trojan horses.
VIRUSES
• Some of the viruses are harmless while some of it can damaging our system
component.

WORMS
• It fill the computer a computer system with self replicating
information, clogging the system that is operation are slowed/stopped
• Typically find their way into microcomputer through e-mail
attached/programs downloaded from internet
Trojan horses
• Disguised as something else
• Not a viruses , but it carries viruses.
Zombies
• Remotely controlled infected computer for malicious purpose.
• A collection of zombies computer is known as botnet or robot network
NATURAL DISASTER:
• Included fires,flod,wind,hurricans and tornado.Even computer users should store
backup disk of programms and data in safe location.
CIVIL STRIFE AND TERRORISM:
• Wars,riot,and terrorist activities are real risks in all parts of the world.
TECHNOLOGICAL FAILURES:
• Microcomputer should use a surge protector,a divice that separate the computer
from the power source of the wall outlet.This may protect the computer
HUMAN ERRORS:
• Human mistakes are inevitable.Data entry errors are probably the most
commonplace could lead to mistaken identity.
• Occur when office workers save important documents under files names that are
not descriptive and not recognizable by others
RESTRICTING ACCESS :
Sometimes security matter of putting guards on
company computer rooms and checking the
identification of everyone admitted.Other times it use
biometric scanning such as fingerprint and iris.
Password are secret words or phrases that must be
keyed into a computer system to gain access.
E-MAIL ENCRYPTING : Protect e-mails messages as the moves
across the internet.
FILE ENCRYPTING :Protects sensitive files by encrypting them
before they stored on a hard drive.
WEB SITES ENCRYPTING :Secures Web transaction,especially
financial transaction
VIRTUAL PRIVATE NETWORK(VPN) :Encrypt connections
between company networks and remote users such as
workers connecting from home
WIRELESS NETWORK ENCRYPTING :Restricts access to
authorized uses on wireless network.WEA(WIRED
EQUIVALENT PRIVACY) is one of the best-known wireless
encryption protocols.
Ethics ?
 Standards of moral products.
-the right to keep personal information, such as credit
ratings and medical histories, from getting into
unauthorized hands.
2 important issues in computer ethics.
1. Copyright and Digital Right Management

2. Plagiarism
• Gives content creators the right to control the
use and distribution of their work.
Example of materials :
• Paintings , books , music, films , video games.

Others : make unauthorized copies
• Digital media. (violates copyright)
• Is the unauthorized copying and distribution of software.

Digital Millennium Copyright Act
-established the right of the program owner to make a backup
copy and disallow the creation of copies.
-illegal to download copyright-protected music and videos from
Internet.

Digital rights management (DRM)
-collection of technologies designed to prevent copyright
violations.
-control the number of devices that can access given file.
-limits the kinds of devices that can access a file.
• The illegal and unethical representation of
some other person’s work and ideas as your
own without giving credit to the original
source.
• Example :
cutting &
pasting Web content
into a report or paper.
Cryptographers design encryption algorithms,
break codes, and provide support to nasional
security efforts.
 PhD in mathematics and broad experience in
computer science are required.
Salary range is $60.000 to over $100,000.
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation

More Related Content

What's hot

Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethicsiallen
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal lawHamza Cheema
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal informationUc Man
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpointDLRUDO01
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 

What's hot (20)

Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Internet security
Internet securityInternet security
Internet security
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 

Similar to Privacy , Security and Ethics Presentation

Similar to Privacy , Security and Ethics Presentation (20)

Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
sc.pptx
sc.pptxsc.pptx
sc.pptx
 
UNIT V.pptx
UNIT V.pptxUNIT V.pptx
UNIT V.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Privacy , Security and Ethics Presentation

  • 1. Hamimah bte Mohd Jamil    MUHAMMAD BIN MOHD SUKERI (A13CS0068) NURUL EMIRA BINTI ABDUL AZIZ (A13CS0128) WAN HAJARUL ASIKIN BINTI WAN ZUNAIDI (A13CS0168)
  • 2.
  • 3. PRIVACY • Computing technology makes it possible to collect and use our data. • The website we visit is one of the way the data collection. • Would you matter if your personal information is been shared ? PRIMARY PRIVACY ISSUES ACCURACY :Relates to the responsibility of those who collect the data is correct PROPERTY :who on data and right to the software ACCESS :relates to the responsibility of those who have data to control who is able to use it
  • 4. LARGE DATABASE • Large organisation are constantly compiling information about us. • There are about 2000 database • Example : Telephone companies-compile lists of the call we make. • REVERSE DIRECTORY list telephone number followed by subscriber names. • *insert picture • *change title
  • 5. • Information reseller(information broker) : Collect and sell personal data. Electronic Profiles : are compiled from database to provide highly detailed and personalized descriptions of individual • Our personal information has been a marketable commodity. This raises many issues including : 1.COLLECTING PUBLIC,BUT PERSONALLY IDENTIFYING INFORMATION. 2.SPREADING INFORMATION WITHOUT PERSONAL CONSENT. 3.SPREADING INACCURATE INFORMATION
  • 6. IDENTITY THEFT : • Is the illegal assumption of someone’s identity for the purpose of economic gain. MISTAKEN IDENTITY : • Occurs when an electronic profile of one person is switched with another. • INFORMATION OF INFORMATION ACT : entitles individuals access to governmental records relating to them.
  • 7. Many organization monitor employee e-mail and computer files using software called SNOOPWARE Many people believe that, while using the web, little can be done to invade their privacy. This is called the illusion of anonymity Record location of visited sites Two basic type are TRADITIONAL COOKIES AND AD NETWORK COOKIES(ADWARE COOKIES).
  • 8. • TRADITIONAL COOKIES-Provide information to a single sites,a cookies is deposited with the information that identifies specifically • AD NETWORK(ADWARE COOKIES-Record your activities across different sites. • PRIVACY MODE(INPRIVATE BROWSING;PRIVATER BROWSING)eliminate history files and block cookies. • SPYWARE-Secretly record and report internet activities. • COMPUTER MONITORING(KEYSTROKE LOGGERS)-watches what you do. • WEB BUGS-Provide information back to spammers about activity on e-mail account. • ANTISPYWARE(SPY REMOVAL PROGRAM)-detect Web bug and monitoring software.
  • 9. GRAMM-LEACH-BLILEY ACT • Protect personal financial information HEALTH INSURANCE PROTABILITY AND ACCOUNTABILITY ACT(HIPAA) • Protect medical records FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT(FREPA) • Restricts disclosure of educational records
  • 10.
  • 11. • Computer criminal included employee , outside users , hacker and crackers ,carders , organized crime, and terrorist • HACKER :Create or improve programs and shared those program with fellow hackers . Typically are not criminal. • CRACKERS :Share programs designed to gain unauthorized access computer systems or disrupt networks.Typically are criminals. • CARDERS :Specialize in stealing,trading and using stolen credit cards over the internet.
  • 12. Is an illegal action involving special knowledge of computer technology • CYBER-BULLYING : intended to hurt or embarrass another person. • ROGUE WI-FI HOTSPOT :Capture personal information • SCAMS : designed to trick people into spending their time/money.
  • 13. • DENIAL OF SERVICE ATTACK(DOS) : Is attempt to shut down or stop a computer system/network.it floods a computer or network with requests for information and data. • Theft : Takes many forms including stealing hardware, software, data and computer time. • Data manipulation : Involves changing data or leaving prank messages .The Computer Fraud and Abuse Act helps protect against data manipulation.
  • 14. • MALICIOUS PROGRAMS (MALWARE) : Design to damage or disrupt computer system.3 most common types of malware are viruses, worms, and Trojan horses. VIRUSES • Some of the viruses are harmless while some of it can damaging our system component. WORMS • It fill the computer a computer system with self replicating information, clogging the system that is operation are slowed/stopped • Typically find their way into microcomputer through e-mail attached/programs downloaded from internet Trojan horses • Disguised as something else • Not a viruses , but it carries viruses. Zombies • Remotely controlled infected computer for malicious purpose. • A collection of zombies computer is known as botnet or robot network
  • 15. NATURAL DISASTER: • Included fires,flod,wind,hurricans and tornado.Even computer users should store backup disk of programms and data in safe location. CIVIL STRIFE AND TERRORISM: • Wars,riot,and terrorist activities are real risks in all parts of the world. TECHNOLOGICAL FAILURES: • Microcomputer should use a surge protector,a divice that separate the computer from the power source of the wall outlet.This may protect the computer HUMAN ERRORS: • Human mistakes are inevitable.Data entry errors are probably the most commonplace could lead to mistaken identity. • Occur when office workers save important documents under files names that are not descriptive and not recognizable by others
  • 16. RESTRICTING ACCESS : Sometimes security matter of putting guards on company computer rooms and checking the identification of everyone admitted.Other times it use biometric scanning such as fingerprint and iris. Password are secret words or phrases that must be keyed into a computer system to gain access.
  • 17. E-MAIL ENCRYPTING : Protect e-mails messages as the moves across the internet. FILE ENCRYPTING :Protects sensitive files by encrypting them before they stored on a hard drive. WEB SITES ENCRYPTING :Secures Web transaction,especially financial transaction VIRTUAL PRIVATE NETWORK(VPN) :Encrypt connections between company networks and remote users such as workers connecting from home WIRELESS NETWORK ENCRYPTING :Restricts access to authorized uses on wireless network.WEA(WIRED EQUIVALENT PRIVACY) is one of the best-known wireless encryption protocols.
  • 18.
  • 19. Ethics ?  Standards of moral products. -the right to keep personal information, such as credit ratings and medical histories, from getting into unauthorized hands.
  • 20. 2 important issues in computer ethics. 1. Copyright and Digital Right Management 2. Plagiarism
  • 21. • Gives content creators the right to control the use and distribution of their work. Example of materials : • Paintings , books , music, films , video games. Others : make unauthorized copies • Digital media. (violates copyright)
  • 22. • Is the unauthorized copying and distribution of software. Digital Millennium Copyright Act -established the right of the program owner to make a backup copy and disallow the creation of copies. -illegal to download copyright-protected music and videos from Internet. Digital rights management (DRM) -collection of technologies designed to prevent copyright violations. -control the number of devices that can access given file. -limits the kinds of devices that can access a file.
  • 23. • The illegal and unethical representation of some other person’s work and ideas as your own without giving credit to the original source. • Example : cutting & pasting Web content into a report or paper.
  • 24. Cryptographers design encryption algorithms, break codes, and provide support to nasional security efforts.  PhD in mathematics and broad experience in computer science are required. Salary range is $60.000 to over $100,000.