SlideShare a Scribd company logo
1 of 11
PRIVACY ISSUES
Presented by:
NARESH M
•Privacy is the claim of individuals, groups or institutions to determine for
themselves when, how, and to what extent information about them is
communicated to others”
•Privacy is not an absolute
What is privacy?
Westin’s four states of privacy
Solitude
– individual separated from the group and freed from the
observation of other persons
Intimacy
– individual is part of a small unit
Anonymity
– individual in public but still seeks and finds freedom from
identification and surveillance
Reserve
– the creation of a psychological barrier against unwanted
intrusion - holding back communication
Different views of privacy
Privacy as limited access to self
• the extent to which we are known to others and the extent to which
others have physical access to us
Privacy as control over information
• not simply limiting what others know about you, but controlling it
• this assumes individual autonomy, that you can control information
in a meaningful way (not blind click through)
Privacy surveys find concerns
•About 75 per cent of the participants had never read the privacy policy on any
website that they interact with
•And about the same percentage of participants had never read the privacy policy of
a website before sharing his/her personal information,”says the study conducted by
Prof Ponnurangam Kumaraguru (PK) and Niharika Sachdeva for PreCog@IIIT-Delhi
that claimed to have covered over 10,000 people in India.
PRIVACY ISSUES FROM INTERNET
•Facebook CEO Mark Zuckerberg took personal responsibility for letting
malicious parties have access to user data
•The company will embark on a three-year push to prevent these issues
from happening in the future, but expects the process to take years.
Pervasive computing attacks
ARP Poisoning : ARP poisoning is an effective form of attack by a hacker,
whereby he can masquerade a network and fool the sending host. This happens
because the ARP broadcast reaches him too once connected to the wired LAN or
listen to wireless LAN.
Insider Attack: These types of attack have attracted increasing attention as they
have led to severe damages. Extensive survey reports consistently show that
insider attacks are the most common and costlier threat to enterprise the data and
network security. An insider attack can be launched either by a legitimate user
who owns access credential or by an intruder who steals or crack the network
access credential.
Cloud Privacy Threats
1. Data breaches
2. Insufficient identity, credential, and access management
3. Insecure interfaces and application programming interfaces (APIs)
4. Account hijacking
5. Malicious insiders
6. Advanced persistent threats (APTs)
7. Data loss
8. Insufficient due diligence
How to be secure from these threats
 Password-protect everything
 Keep your computer virus-free
 Secure your browser
 Switch search engines
 Be careful what you share on social media
 Ask why others need your information
 Don't fall for scams
 Only use software you trust
 Only use secure Wi-Fi connections
CONCLUSIONS
The only 2 absolute choice
1. Raise awareness about privacy
2. Learn to safeguard your privacy with the minimum sacrifice of your
convenience
Privacy issues.pptx

More Related Content

Similar to Privacy issues.pptx

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
xenhalo561
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
Gemy Chan
 

Similar to Privacy issues.pptx (20)

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Ethical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorldEthical Dilemmas/Issues in CyberWorld
Ethical Dilemmas/Issues in CyberWorld
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Data information and security unit 1.pdf
Data information and security unit 1.pdfData information and security unit 1.pdf
Data information and security unit 1.pdf
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
Website security
Website securityWebsite security
Website security
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Chapter-I introduction
Chapter-I introductionChapter-I introduction
Chapter-I introduction
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 PresentationWill My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
Will My SaaS Provider Leak My Corporate Data? - Collaborate '15 Presentation
 
COMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptxCOMPUTER APPLICATIONS Module 4.pptx
COMPUTER APPLICATIONS Module 4.pptx
 
Why is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital WorldWhy is Cybersecurity Important in the Digital World
Why is Cybersecurity Important in the Digital World
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.Ns lecture5: Introduction to Computer, Information, and Network Security.
Ns lecture5: Introduction to Computer, Information, and Network Security.
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Nhs dealing with cyber threat
Nhs dealing with cyber threatNhs dealing with cyber threat
Nhs dealing with cyber threat
 
02 fundamental aspects of security
02 fundamental aspects of security02 fundamental aspects of security
02 fundamental aspects of security
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 

Privacy issues.pptx

  • 2. •Privacy is the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” •Privacy is not an absolute What is privacy?
  • 3. Westin’s four states of privacy Solitude – individual separated from the group and freed from the observation of other persons Intimacy – individual is part of a small unit Anonymity – individual in public but still seeks and finds freedom from identification and surveillance Reserve – the creation of a psychological barrier against unwanted intrusion - holding back communication
  • 4. Different views of privacy Privacy as limited access to self • the extent to which we are known to others and the extent to which others have physical access to us Privacy as control over information • not simply limiting what others know about you, but controlling it • this assumes individual autonomy, that you can control information in a meaningful way (not blind click through)
  • 5. Privacy surveys find concerns •About 75 per cent of the participants had never read the privacy policy on any website that they interact with •And about the same percentage of participants had never read the privacy policy of a website before sharing his/her personal information,”says the study conducted by Prof Ponnurangam Kumaraguru (PK) and Niharika Sachdeva for PreCog@IIIT-Delhi that claimed to have covered over 10,000 people in India.
  • 6. PRIVACY ISSUES FROM INTERNET •Facebook CEO Mark Zuckerberg took personal responsibility for letting malicious parties have access to user data •The company will embark on a three-year push to prevent these issues from happening in the future, but expects the process to take years.
  • 7. Pervasive computing attacks ARP Poisoning : ARP poisoning is an effective form of attack by a hacker, whereby he can masquerade a network and fool the sending host. This happens because the ARP broadcast reaches him too once connected to the wired LAN or listen to wireless LAN. Insider Attack: These types of attack have attracted increasing attention as they have led to severe damages. Extensive survey reports consistently show that insider attacks are the most common and costlier threat to enterprise the data and network security. An insider attack can be launched either by a legitimate user who owns access credential or by an intruder who steals or crack the network access credential.
  • 8. Cloud Privacy Threats 1. Data breaches 2. Insufficient identity, credential, and access management 3. Insecure interfaces and application programming interfaces (APIs) 4. Account hijacking 5. Malicious insiders 6. Advanced persistent threats (APTs) 7. Data loss 8. Insufficient due diligence
  • 9. How to be secure from these threats  Password-protect everything  Keep your computer virus-free  Secure your browser  Switch search engines  Be careful what you share on social media  Ask why others need your information  Don't fall for scams  Only use software you trust  Only use secure Wi-Fi connections
  • 10. CONCLUSIONS The only 2 absolute choice 1. Raise awareness about privacy 2. Learn to safeguard your privacy with the minimum sacrifice of your convenience

Editor's Notes

  1. //economictimes.indiatimes.com/articleshow/17542954.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
  2. https://www.csoonline.com/article/3043030/security/12-top-cloud-security-threats-for-2018.html
  3. https://www.techlicious.com/tip/simple-ways-to-protect-your-privacy/