SlideShare a Scribd company logo
1 of 12
Privacy What does it mean?
What does privacy mean? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some things we will look at... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mmmmm Cookies: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cookies continued...  ,[object Object]
Posting photos on the internet... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Logging ,[object Object],[object Object],[object Object],[object Object]
Cache ,[object Object],[object Object],[object Object]
Email  ,[object Object],[object Object],[object Object],[object Object]
What can you do to protect your privacy on the internet? Some tips.... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How much do you know about internet privacy? ,[object Object],[object Object],[object Object],[object Object],[object Object]
References: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Blogging
BloggingBlogging
Blogging
mhex123
 
What Is A Web Browser
What Is A Web BrowserWhat Is A Web Browser
What Is A Web Browser
kevpatel
 
WordPress as a Masters Thesis
WordPress as a Masters ThesisWordPress as a Masters Thesis
WordPress as a Masters Thesis
Jørgen Hookham
 

What's hot (17)

Disaster Proof your WordPress Website
Disaster Proof your WordPress WebsiteDisaster Proof your WordPress Website
Disaster Proof your WordPress Website
 
23 Things @ UL Lunchtime talk Blogs & RSS
23 Things @ UL Lunchtime talk Blogs & RSS23 Things @ UL Lunchtime talk Blogs & RSS
23 Things @ UL Lunchtime talk Blogs & RSS
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Blogging
BloggingBlogging
Blogging
 
Web browser(16 03-2018)
Web browser(16 03-2018)Web browser(16 03-2018)
Web browser(16 03-2018)
 
WAS-for-dummies
WAS-for-dummiesWAS-for-dummies
WAS-for-dummies
 
What Is A Web Browser
What Is A Web BrowserWhat Is A Web Browser
What Is A Web Browser
 
Cookie
CookieCookie
Cookie
 
Security 101
Security 101Security 101
Security 101
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
Internet cookies
Internet cookiesInternet cookies
Internet cookies
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
WordPress as a Masters Thesis
WordPress as a Masters ThesisWordPress as a Masters Thesis
WordPress as a Masters Thesis
 
User Guide of TimeAlly
User Guide of TimeAllyUser Guide of TimeAlly
User Guide of TimeAlly
 
TOD 5 Nov 2010
TOD 5 Nov 2010TOD 5 Nov 2010
TOD 5 Nov 2010
 
Tìm hiểu Wordpress shortcode
Tìm hiểu Wordpress  shortcodeTìm hiểu Wordpress  shortcode
Tìm hiểu Wordpress shortcode
 
Presentation on Internet Cookies
Presentation on Internet CookiesPresentation on Internet Cookies
Presentation on Internet Cookies
 

Similar to Privacy

Hhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacyHhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacy
Shoaib Sheikh
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos Beretas
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Similar to Privacy (20)

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
StartPad Countdown 2 - Startup Security: Hacking and Compliance in a Web 2.0 ...
 
Module 1 content EN.pptx
Module 1 content EN.pptxModule 1 content EN.pptx
Module 1 content EN.pptx
 
Digital Literacy presentation
Digital Literacy presentationDigital Literacy presentation
Digital Literacy presentation
 
Digital literacy presentation
Digital literacy presentationDigital literacy presentation
Digital literacy presentation
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
INTERNET PRIVACY
INTERNET PRIVACYINTERNET PRIVACY
INTERNET PRIVACY
 
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
OpenTechTalks: Ethical hacking with Kali Linux (Tijl Deneut, UGent)
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
Hhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacyHhs en10 web_security_and_privacy
Hhs en10 web_security_and_privacy
 
Cyber security
Cyber securityCyber security
Cyber security
 
Confidentiality in a Digital World
Confidentiality in a Digital WorldConfidentiality in a Digital World
Confidentiality in a Digital World
 
Digital Literacy Session 2017
Digital Literacy Session 2017Digital Literacy Session 2017
Digital Literacy Session 2017
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 

Privacy