1Arab Academy for Science &Technology & Maritime TransportCollege of Computing and Information Technology
2• Marke&ng	  database:	  Collec&on	  of	  data	  about	  people,	  used	    for	  marke&ng	  purposes	     • Data	  obtai...
3• Electronic	  profiling	    • Using	  electronic	  means	  to	  collect	  a	  variety	  of	  in-­‐depth	      informa&on	...
4
5
6• Safeguard	  your	  e-­‐mail	  address	    • Use	  a	  throw-­‐away	  e-­‐mail	  address	  (an	  extra	  e-­‐mail	  addr...
7• Be	  cau&ous	  of	  revealing	   personal	  	  informa&on	    • Read	  a	  Web	  site’s	  privacy	      policy	    • Ca...
8
9An	  anonymizer	  or	  an	  anonymous	  proxy	  is	  a	  tool	  that	  aUempts	  to	  make	  ac&vity	  on	  the	  untrace...
10• Be	  cau&ous	  of	  revealing	  personal	  	  informa&on	    • Read	  a	  Web	  site’s	  privacy	  policy	    • Avoid	...
11• Use	  an	  e-­‐mail	  filter	  to	  automa&cally	  route	  possible	  spam	   into	  a	  special	  folder	  to	  deal	 ...
12• Web	  servers	  holding	  sensi&ve	  data	  should	  be	  secured	    • Only	  enter	  personal	  informa&on	  on	  We...
13• Properly	  dispose	  of	  hardware	   and	  outdated	  data	    • Wipe	  (not	  just	  delete)	  data	      on	  hard	...
14
15
16
17
18
19• Difficult	  for	  legal	  system	  to	  keep	  pace	  with	  technology	  • Difficult	  to	  balance	  freedom	  of	  spee...
Upcoming SlideShare
Loading in...5
×

Lect 08 computer security and privacy 2 4 q

162

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
162
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Lect 08 computer security and privacy 2 4 q

  1. 1. 1Arab Academy for Science &Technology & Maritime TransportCollege of Computing and Information Technology
  2. 2. 2• Marke&ng  database:  Collec&on  of  data  about  people,  used   for  marke&ng  purposes   • Data  obtained  through  online  and  offline  purchases,   public  informa&on,  etc.   • Beginning  to  be  used  in  conjunc&on  with  Web  ac&vi&es  • Government  database:  Collec&on  of  data  about  people,   collected  and  maintained  by  the  government   • Tax  informa&on,  Social  Security  earnings,  personal  health   records,  marriage  and  divorce  informa&on   • Some  informa&on  is  confiden&al,  other  is  public  
  3. 3. 3• Electronic  profiling   • Using  electronic  means  to  collect  a  variety  of  in-­‐depth   informa&on  about  an  individual  
  4. 4. 4
  5. 5. 5
  6. 6. 6• Safeguard  your  e-­‐mail  address   • Use  a  throw-­‐away  e-­‐mail  address  (an  extra  e-­‐mail  address   that  you  can  use  for    ac&vi&es                                                                                           that  might  result  in    spam)   • Get  a  second  e-­‐mail  address                                                                                               from  your  ISP  or  from  Hotmail,                                                                                                 Yahoo!  Mail,  or  Gmail   • Can  stop  using  it     and  get  a  new  one     when  needed  
  7. 7. 7• Be  cau&ous  of  revealing   personal    informa&on   • Read  a  Web  site’s  privacy   policy   • Can  use  privacy  soSware,   such  as  the  free  Privacy   Bird  program   • Do  not  supply  personal   informa&on  to  people  in   chat  rooms    
  8. 8. 8
  9. 9. 9An  anonymizer  or  an  anonymous  proxy  is  a  tool  that  aUempts  to  make  ac&vity  on  the  untraceable.    It  is  a  proxy  server  computer  that  acts  as  an  intermediary  and  privacy  shield  between  a  client  computer  and  the  rest  of  the  Internet.    It  accesses  the  Internet  on  the  users  behalf,  protec&ng  personal  informa&on  by  hiding  the  client  computers  iden&fying  informa&on    
  10. 10. 10• Be  cau&ous  of  revealing  personal    informa&on   • Read  a  Web  site’s  privacy  policy   • Avoid  puWng  too  many  personal  details  on  your  Web  site   • Be  wary  of  sites  offering  prizes  in  exchange  for  personal   informa&on   • Consider  using  privacy  soSware,  such  as  anonymous   surfing   • Supply  only  the  required  informa&on  in  registra&on  forms   • Delete  your  browsing  history  and  e-­‐mail  seWngs  when   using  a  public  computer  
  11. 11. 11• Use  an  e-­‐mail  filter  to  automa&cally  route  possible  spam   into  a  special  folder  to  deal  with  later  
  12. 12. 12• Web  servers  holding  sensi&ve  data  should  be  secured   • Only  enter  personal  informa&on  on  Web  sites  using   secure  servers     • Automa&c  encryp&on  systems  for  e-­‐mail  can  help   sensi&ve  data  from  accidentally  being  revealed  
  13. 13. 13• Properly  dispose  of  hardware   and  outdated  data   • Wipe  (not  just  delete)  data   on  hard  drives  before     disposing  of  a  computer  or   hard  drive   • Storage  media  containing   sensi&ve  data  should  be   shredded   • Businesses  should  have  a   media  sanita&on/data   destruc&on  policy  
  14. 14. 14
  15. 15. 15
  16. 16. 16
  17. 17. 17
  18. 18. 18
  19. 19. 19• Difficult  for  legal  system  to  keep  pace  with  technology  • Difficult  to  balance  freedom  of  speech  with  privacy  
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×