2. •Privacy is the claim of individuals, groups or institutions to determine for
themselves when, how, and to what extent information about them is
communicated to others”
•Privacy is not an absolute
What is privacy?
3. Westin’s four states of privacy
Solitude
– individual separated from the group and freed from the
observation of other persons
Intimacy
– individual is part of a small unit
Anonymity
– individual in public but still seeks and finds freedom from
identification and surveillance
Reserve
– the creation of a psychological barrier against unwanted
intrusion - holding back communication
4. Different views of privacy
Privacy as limited access to self
• the extent to which we are known to others and the extent to which
others have physical access to us
Privacy as control over information
• not simply limiting what others know about you, but controlling it
• this assumes individual autonomy, that you can control information
in a meaningful way (not blind click through)
5. Privacy surveys find concerns
•About 75 per cent of the participants had never read the privacy policy on any
website that they interact with
•And about the same percentage of participants had never read the privacy policy of
a website before sharing his/her personal information,”says the study conducted by
Prof Ponnurangam Kumaraguru (PK) and Niharika Sachdeva for PreCog@IIIT-Delhi
that claimed to have covered over 10,000 people in India.
6. PRIVACY ISSUES FROM INTERNET
•Facebook CEO Mark Zuckerberg took personal responsibility for letting
malicious parties have access to user data
•The company will embark on a three-year push to prevent these issues
from happening in the future, but expects the process to take years.
7. Pervasive computing attacks
ARP Poisoning : ARP poisoning is an effective form of attack by a hacker,
whereby he can masquerade a network and fool the sending host. This happens
because the ARP broadcast reaches him too once connected to the wired LAN or
listen to wireless LAN.
Insider Attack: These types of attack have attracted increasing attention as they
have led to severe damages. Extensive survey reports consistently show that
insider attacks are the most common and costlier threat to enterprise the data and
network security. An insider attack can be launched either by a legitimate user
who owns access credential or by an intruder who steals or crack the network
access credential.
8. Cloud Privacy Threats
1. Data breaches
2. Insufficient identity, credential, and access management
3. Insecure interfaces and application programming interfaces (APIs)
4. Account hijacking
5. Malicious insiders
6. Advanced persistent threats (APTs)
7. Data loss
8. Insufficient due diligence
9. How to be secure from these threats
Password-protect everything
Keep your computer virus-free
Secure your browser
Switch search engines
Be careful what you share on social media
Ask why others need your information
Don't fall for scams
Only use software you trust
Only use secure Wi-Fi connections
10. CONCLUSIONS
The only 2 absolute choice
1. Raise awareness about privacy
2. Learn to safeguard your privacy with the minimum sacrifice of your
convenience