Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
PRIVACY - HOW ANONYMOUS                                   ARE YOU?                               Newsletter Date          ...
PRIVACY - HOW ANONYMOUS                                            ARE YOU?                      PAGE 2                   ...
Upcoming SlideShare
Loading in …5

NCSAM 2012 Privacy


Published on

National Cyber Security Month - Oct 2012

  • Be the first to comment

  • Be the first to like this

NCSAM 2012 Privacy

  1. 1. PRIVACY - HOW ANONYMOUS ARE YOU? Newsletter Date HOW TO KNOW INFORMATION IS COLLECTED FROM EVERYONE YOUR PRIVACY IS BEING PROTECTEDWhen you visit a website, a certain amount of Privacy policy - Before submitting yourinformation is automatically sent to the site. This name, email address, or other personalinformation may include the following: information on a website, look for the sites privacy policy. This policy should IP address - Each computer on the internet is state how the information will be used assigned a specific, unique IP (internet protocol) and whether or not the information will address. It’s like a street address for your be distributed to other organizations. computer. Look for indications that you are being domain name - You can identify the domain by added to mailing lists by default—failing looking at the end of URL; for example, .edu to deselect those options may lead to indicates an educational institution, .gov unwanted spam. Privacy policies indicates a US government agency, .org refers sometimes change (ie Facebook) so to organization, and .com is for commercial use. you may want to review them details - It is possible for an organization to Evidence that your information is being determine which browser, and operating system encrypted - To protect attackers from that you used to access its site. hijacking your information, any personal information submitted online should be page visits - Information about which pages you encrypted so that it can only be read by visited, how long you stayed on a given page, the appropriate recipient. Many sites and whether you came to the site from a search use SSL, or secure sockets layer, to engine is available to the organization operating encrypt information. Indications that the website . your information will be encryptedIf a website uses cookies, the organization may be include a URL that begins with "https:"able to collect even more information, such as your instead of "http:" If data is encrypted inbrowsing patterns, which include other sites youve transit but stored insecurely, anvisited. If the site youre visiting is malicious, files on attacker who isyour computer, as well as able to breakpasswords stored in the into the Created by thetemporary memory, may vendors 375AMWbe at risk. system could Information Assurance access your Office personal information.
  2. 2. PRIVACY - HOW ANONYMOUS ARE YOU? PAGE 2 Newsletter Date LIMIT THE AMOUNT OF INFORMATION COLLECTED PROTECT YOUR PRIVACY ABOUT YOUDo business with credible companies - Before supplying any Be careful supplying personal information consider the answers to the following questions: information - Unless you trust a site, do you trust the business? is it an established organization dont give your address, password, or with a credible reputation? is there legitimate contact credit card information. Look for information provided? indications that the site uses SSL to encrypt your information AlthoughDo not use your primary email address in online submissions - Submitting your email address could result some sites require you to supply your in spam. Consider opening an additional email account for social security number (e.g., sites use online. Make sure to log in to the account on a regular associated with financial transactions basis in case the vendor sends information about changes such as loans or credit cards), be to policies. especially wary of providing this information online.Avoid submitting credit card information online - Some companies offer a phone number you can use to provide your credit card information. This eliminates the possibility Limit cookies - If an attacker can that attackers will be able to hijack it during the submission access your computer, he or she may process. be able to find personal data stored in cookies. You may not realize theDevote one credit card to online purchases - To minimize the extent of the information stored on potential damage of an attacker gaining access to your your computer until it is too late. credit card information, consider opening a credit card account for use only online.Avoid using debit cards for online purchases - Debit cards Browse safely - Be careful which normally do not offer the online protection that credit cards websites you visit; if it seems offer. suspicious, leave the site. Also make sure to take precautions byTake advantage of options to limit exposure of private increasing your information - Avoid allowing a website to remember your security settings, password. If your password is stored, your profile and any keeping your account information you have provided on that site is readily virus definitions available if an attacker gains access to your computer. Also, up to date and evaluate your settings on websites used for social scanning your networking. The nature of those sites is to share information, computer for but you can restrict it. spyware