• Like
  • Save
Final Powerpoint Presentation
Upcoming SlideShare
Loading in...5
×
 

Final Powerpoint Presentation

on

  • 219 views

 

Statistics

Views

Total Views
219
Views on SlideShare
219
Embed Views
0

Actions

Likes
0
Downloads
2
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Final Powerpoint Presentation Final Powerpoint Presentation Presentation Transcript

    • COMPUTER SECURITY & PRIVACYPresented by: Yvette Cedano
    • Internet Monitoring(Surveillance): Tracking
    •  Network Surveillance: Corporate Surveillance:
    • Cloud Computing
    •  3 categories:  Infrastructure-as-a-Service  Platform-as-a-Service  Software-as-a-Service 3 characteristics:  Sold on demand (by minute or hour)  Elastics: user has as much / little service as wanted at any time  Service fully managed by provider Private or public:
    • Internet Parental ControlSoftware
    •  “Safe Eyes” Parental Control
    • CAPTCHA Challenge response test http://www.captcha.net/
    • Internet Anonymity
    •  Ability to conceal your identity while communicating with others Full anonymity not guaranteed
    • Radio Frequency Identification Small electronic devices Same effect as bar code / magnetic strip on credit card Reader collision: Tag collisions:
    • Internet Security & Privacy Act 2010 No state agency can collect / share user info through internet State can only collect / disclose info if:
    • Sources 1. Internet Monitoring Software:  http://pcmonitoringsoftwares.net/what-is-internet-monitoring-software/ 2. Cloud Computing:  http://searchcloudcomputing.techtarget.com/definition/cloud-computing 3. Parental Control:  http://www.internetsafety.com/safe-eyes-parental-control-software.php?gclid=CLLl- smy86wCFQPe4AodnH1Btw  http://www.monitoringsoftwarereviews.org/ 4. CAPTCHA:  http://www.google.com/recaptcha/captcha 5. Internet Anonymity:  http://epic.org/privacy/anonymity/ 6. RFID:  http://www.technovelgy.com/ct/Technology-Article.asp 7. Internet Security & Privacy Act:  http://law.justia.com/codes/new-york/2010/stt/article-2/  GOOGLE IMAGES