SlideShare a Scribd company logo
1 of 13
COMPUTER SECURITY
          & PRIVACY

Presented by: Yvette Cedano
Internet Monitoring
(Surveillance): Tracking
 Network Surveillance:
 Corporate Surveillance:
Cloud Computing
   3 categories:
     Infrastructure-as-a-Service
     Platform-as-a-Service
     Software-as-a-Service
   3 characteristics:
     Sold on demand (by minute or hour)
     Elastics: user has as much / little service as wanted at any time
     Service fully managed by provider
   Private or public:
Internet Parental Control
Software
 “Safe Eyes” Parental Control
CAPTCHA


 Challenge response test
 http://www.captcha.net/
Internet Anonymity
 Ability to conceal your identity while communicating with
  others
 Full anonymity not guaranteed
Radio Frequency
              Identification
 Small electronic devices
 Same effect as bar code / magnetic strip on credit card
 Reader collision:
 Tag collisions:
Internet Security & Privacy Act 2010


 No state agency can collect / share user info through
  internet
 State can only collect / disclose info if:
Sources
   1. Internet Monitoring Software:
        http://pcmonitoringsoftwares.net/what-is-internet-monitoring-software/
   2. Cloud Computing:
       http://searchcloudcomputing.techtarget.com/definition/cloud-computing
   3. Parental Control:
       http://www.internetsafety.com/safe-eyes-parental-control-software.php?gclid=CLLl-
        smy86wCFQPe4AodnH1Btw
       http://www.monitoringsoftwarereviews.org/
   4. CAPTCHA:
       http://www.google.com/recaptcha/captcha
   5. Internet Anonymity:
        http://epic.org/privacy/anonymity/
   6. RFID:
       http://www.technovelgy.com/ct/Technology-Article.asp
   7. Internet Security & Privacy Act:
        http://law.justia.com/codes/new-york/2010/stt/article-2/

       GOOGLE IMAGES

More Related Content

What's hot

Security Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessSecurity Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessCatherine MacAllister
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.vivatechijri
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessMegan Bell
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsCatherine MacAllister
 
Hi security in telemedicine
Hi   security in telemedicineHi   security in telemedicine
Hi security in telemedicinejbarbudo
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application SecurityColin English
 
Cocoon On Internet Security
Cocoon On Internet SecurityCocoon On Internet Security
Cocoon On Internet SecurityCOCOON
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesrebelreg
 
Deviceidentity 150909102029-lva1-app6891
Deviceidentity 150909102029-lva1-app6891Deviceidentity 150909102029-lva1-app6891
Deviceidentity 150909102029-lva1-app6891Lan & Wan Solutions
 
Phishing Detection using Machine Learning
Phishing Detection using Machine LearningPhishing Detection using Machine Learning
Phishing Detection using Machine LearningArjun BM
 
Root conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmRoot conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmArjun BM
 
Uop cis 349 final exam guide set 1 new
Uop cis 349 final exam guide set 1 newUop cis 349 final exam guide set 1 new
Uop cis 349 final exam guide set 1 newuopassignment
 
Stayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newStayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newshyaminfo17
 
Stayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newStayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newTristanmillerr
 

What's hot (17)

Security Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 WirelessSecurity Awareness 9-10-09 v5 Wireless
Security Awareness 9-10-09 v5 Wireless
 
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.A Hybrid Approach For Phishing Website Detection Using Machine Learning.
A Hybrid Approach For Phishing Website Detection Using Machine Learning.
 
Security Software
Security SoftwareSecurity Software
Security Software
 
Security Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info WirelessSecurity Awareness 9 10 09 V4 Sens Info Wireless
Security Awareness 9 10 09 V4 Sens Info Wireless
 
Security Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless ConnectionsSecurity Awareness 9 10 04 V4 Wireless Connections
Security Awareness 9 10 04 V4 Wireless Connections
 
Hi security in telemedicine
Hi   security in telemedicineHi   security in telemedicine
Hi security in telemedicine
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Cocoon On Internet Security
Cocoon On Internet SecurityCocoon On Internet Security
Cocoon On Internet Security
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Deviceidentity 150909102029-lva1-app6891
Deviceidentity 150909102029-lva1-app6891Deviceidentity 150909102029-lva1-app6891
Deviceidentity 150909102029-lva1-app6891
 
Phishing Detection using Machine Learning
Phishing Detection using Machine LearningPhishing Detection using Machine Learning
Phishing Detection using Machine Learning
 
Root conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbmRoot conf digitalskimming-v4_arjunbm
Root conf digitalskimming-v4_arjunbm
 
Uop cis 349 final exam guide set 1 new
Uop cis 349 final exam guide set 1 newUop cis 349 final exam guide set 1 new
Uop cis 349 final exam guide set 1 new
 
Broken access control
Broken access controlBroken access control
Broken access control
 
Stayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newStayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 new
 
Digital security
Digital securityDigital security
Digital security
 
Stayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 newStayer cis 349 final exam guide set 1 new
Stayer cis 349 final exam guide set 1 new
 

Viewers also liked

Why International Students Choose San Jose State University
Why International Students Choose San Jose State UniversityWhy International Students Choose San Jose State University
Why International Students Choose San Jose State UniversitySan Jose State University
 
Prepare for an MMA Fight
Prepare for an MMA FightPrepare for an MMA Fight
Prepare for an MMA Fightromerox25
 
Facebook Apps
Facebook AppsFacebook Apps
Facebook Appscustomit
 
Ext js saas&compass
Ext js saas&compassExt js saas&compass
Ext js saas&compasselitonweb
 
Guidence and counselling plan final 1
Guidence and counselling plan final 1Guidence and counselling plan final 1
Guidence and counselling plan final 1RodriguezAnaC
 
Neoclassical theatre (2)
Neoclassical theatre (2)Neoclassical theatre (2)
Neoclassical theatre (2)Maddy Underwood
 
School guidance plan
School guidance planSchool guidance plan
School guidance planRodriguezAnaC
 
SchoolGuidanceAndCounselling
SchoolGuidanceAndCounsellingSchoolGuidanceAndCounselling
SchoolGuidanceAndCounsellingRodriguezAnaC
 
School Guidance and Counselling
School Guidance and CounsellingSchool Guidance and Counselling
School Guidance and CounsellingRodriguezAnaC
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadanajarida_paz
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadanajarida_paz
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadanajarida_paz
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadanajarida_paz
 

Viewers also liked (18)

Why International Students Choose San Jose State University
Why International Students Choose San Jose State UniversityWhy International Students Choose San Jose State University
Why International Students Choose San Jose State University
 
Prepare for an MMA Fight
Prepare for an MMA FightPrepare for an MMA Fight
Prepare for an MMA Fight
 
Facebook Apps
Facebook AppsFacebook Apps
Facebook Apps
 
Ext js saas&compass
Ext js saas&compassExt js saas&compass
Ext js saas&compass
 
Presentation1
Presentation1Presentation1
Presentation1
 
Guidence and counselling plan final 1
Guidence and counselling plan final 1Guidence and counselling plan final 1
Guidence and counselling plan final 1
 
Neoclassical theatre (2)
Neoclassical theatre (2)Neoclassical theatre (2)
Neoclassical theatre (2)
 
School guidance plan
School guidance planSchool guidance plan
School guidance plan
 
SchoolGuidanceAndCounselling
SchoolGuidanceAndCounsellingSchoolGuidanceAndCounselling
SchoolGuidanceAndCounselling
 
School Guidance and Counselling
School Guidance and CounsellingSchool Guidance and Counselling
School Guidance and Counselling
 
буяа нбб үндэс
буяа нбб үндэсбуяа нбб үндэс
буяа нбб үндэс
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadana
 
Abstract Area C
Abstract Area CAbstract Area C
Abstract Area C
 
лекц 3
лекц 3лекц 3
лекц 3
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadana
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadana
 
La contaminación ciudadana
La contaminación ciudadanaLa contaminación ciudadana
La contaminación ciudadana
 
Ace
AceAce
Ace
 

Similar to Final Powerpoint Presentation

Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010wegdam
 
Cyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptxCyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptxAnandarajSathianatha
 
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platformSFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platformSouth Tyrol Free Software Conference
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
 
IoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - AllottIoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - Allottwebinos project
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottwebinos project
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Vikalp Sharma
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationAuliaArifWardana
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationTELKOMNIKA JOURNAL
 
DEVNET-1180 Security from the Cloud
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the CloudCisco DevNet
 
Trends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengulTrends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengulCigdem Sengul
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Borensegughana
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases101 Blockchains
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd Iaetsd
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyIRJET Journal
 

Similar to Final Powerpoint Presentation (20)

Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010
 
Cyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptxCyber Security Cyberella Terminologies.pptx
Cyber Security Cyberella Terminologies.pptx
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platformSFScon 21 - Stefano Della Valle  - The role of DLTs in advanced IoT platform
SFScon 21 - Stefano Della Valle - The role of DLTs in advanced IoT platform
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONAN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
 
IoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - AllottIoT Mashup - webinos iot and m2m - Allott
IoT Mashup - webinos iot and m2m - Allott
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allott
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual Authentication
 
DEVNET-1180 Security from the Cloud
DEVNET-1180	Security from the CloudDEVNET-1180	Security from the Cloud
DEVNET-1180 Security from the Cloud
 
Trends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengulTrends and transients_2019_cigdem_sengul
Trends and transients_2019_cigdem_sengul
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 
Blockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use CasesBlockchain With IoT - Top Blockchain IoT Use Cases
Blockchain With IoT - Top Blockchain IoT Use Cases
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
Panel 8-The future of authentication
Panel 8-The future of authenticationPanel 8-The future of authentication
Panel 8-The future of authentication
 
Online Voting System Using Blockchain Technology
Online Voting System Using Blockchain TechnologyOnline Voting System Using Blockchain Technology
Online Voting System Using Blockchain Technology
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Final Powerpoint Presentation

  • 1. COMPUTER SECURITY & PRIVACY Presented by: Yvette Cedano
  • 3.  Network Surveillance:  Corporate Surveillance:
  • 5. 3 categories:  Infrastructure-as-a-Service  Platform-as-a-Service  Software-as-a-Service  3 characteristics:  Sold on demand (by minute or hour)  Elastics: user has as much / little service as wanted at any time  Service fully managed by provider  Private or public:
  • 7.  “Safe Eyes” Parental Control
  • 8. CAPTCHA  Challenge response test  http://www.captcha.net/
  • 10.  Ability to conceal your identity while communicating with others  Full anonymity not guaranteed
  • 11. Radio Frequency Identification  Small electronic devices  Same effect as bar code / magnetic strip on credit card  Reader collision:  Tag collisions:
  • 12. Internet Security & Privacy Act 2010  No state agency can collect / share user info through internet  State can only collect / disclose info if:
  • 13. Sources  1. Internet Monitoring Software:  http://pcmonitoringsoftwares.net/what-is-internet-monitoring-software/  2. Cloud Computing:  http://searchcloudcomputing.techtarget.com/definition/cloud-computing  3. Parental Control:  http://www.internetsafety.com/safe-eyes-parental-control-software.php?gclid=CLLl- smy86wCFQPe4AodnH1Btw  http://www.monitoringsoftwarereviews.org/  4. CAPTCHA:  http://www.google.com/recaptcha/captcha  5. Internet Anonymity:  http://epic.org/privacy/anonymity/  6. RFID:  http://www.technovelgy.com/ct/Technology-Article.asp  7. Internet Security & Privacy Act:  http://law.justia.com/codes/new-york/2010/stt/article-2/  GOOGLE IMAGES