1. Lecture #22: Web Privacy & Security Breach
Dr.Ramchandra Mangrulkar
September 17, 2020
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 1 / 13
2. Web Privacy
A user can visit websites, send messages, and interact with
applications without revealing an identity. True or False ?
Internet privacy is becoming a growing concern these days for
people of all ages.
Companies track your behavior across websites to serve you with
highly relevant advertisements.
Governments monitor every move you make to predict your
behavior and control you better.
Instant connectivity has changed the way we live and work for
the better, but this convenience comes at a very big price:
your privacy!
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 2 / 13
3. What is Internet Privacy of Web Privacy?
Internet privacy, also commonly referred to as online privacy, is a
subset of data privacy and a fundamental human right.
Basically, it refers to the personal privacy that you’re entitled to
when you display, store, or provide information regarding yourself
on the Internet.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 3 / 13
4. Internet Privacy Issues
Tracking
-based on your earlier web searches or visits to websites.
Surveillance
-allows the government to legally monitor the Internet usage of
its citizens.
Theft
-Cybercriminals use malware, spyware, and phishing techniques
for Identity Theft
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 4 / 13
5. Behaviors That Impact Privacy
Using the Same Credentials for Multiple Accounts
Staying Logged into Websites
Using Services without Reading their Terms Conditions
Opening Suspicious Attachments or Downloading Malicious Files
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 5 / 13
6. Protecting Privacy
Clean computing matters
-Backing up your data
-Protect against malware
-Regularly Update software
-Update your passwords
Check and remove digital footprint
-Search Name in search engines
-Double-check your privacy settings
Educate yourself and your family about social networking
Wipe digital data
social media privacy -read Terms and Conditions
-don’t share private information
-careful about posting photos
-Adjust the social media platform’s privacy
-Know personal data, social media sites store and share
-Carefully select personal details
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 6 / 13
7. Protecting Privacy : Tips
Don’t overshare on social media
Create strong passwords
Browse in incognito or private mode
Use a different search engine
Use a virtual private network
Secure Your Web Browser
Be careful where you click
Secure your mobile devices
Use quality antivirus software
Delete Cookies at Browser Exit
Use HTTPS
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 7 / 13
8. Protecting Privacy : Tips
Encrypt data during Cloud Backup
Secure Online Communications
Share Online Files Securely
Watch Bluetooth vulnerabilities
Keep operating system up to date
Wise up to Wi-Fi
Delete unused data
Familiarize with phishing
Block Cookies
Unlink Accounts
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 8 / 13
9. Security Breatch
A security breach occurs when an intruder gains unauthorized access
to an organization’s protected systems and data.
Cybercriminals or malicious applications bypass security mechanisms
to reach restricted areas.
A security breach is an early-stage violation that can lead to things
like system damage and data loss.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 9 / 13
10. Security Breatch
Attackers can initiate different types of security breaches.
Viruses, spyware, and other malware -Cybercriminals often use
malicious software to break in to protected networks.
Impersonation of an organization
-Cybercriminals may send a bogus, but convincing email to an
employee of an organization
-The email is made to appear like it’s from an executive with an
urgent request for, say, employment records, log-in information,
or other sensitive data.
-Eager to fill the request, the employee may email back the
information — putting it in the hands of cybercriminals.
Denial of service (DDoS) attacks
-A denial-of-service attack is capable of crashing websites
-Hackers can make a website — or a computer — unavailable by
flooding it with traffic.
-overwhelm an organization’s security devices and its ability to
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 10 / 13
11. Security breach or data breach?
A security breach happens first. A data breach may follow.
A security breach occurs when an unauthorized party bypasses
security measures to reach protected areas of a system.
A security breach can put the intruder within reach of valuable
information — company accounts, intellectual property, the
personal information of customers that might include names,
addresses, Social Security numbers, and credit card information.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 11 / 13
12. Examples : security breach
A security breach happens first. A data breach may follow.
The Yahoo security breach began with a spear-phishing email
sent in early 2014. A Yahoo company employee clicked on a link,
giving hackers access to the company’s network. Three Yahoo
breaches in total gave cybercriminals access to 3 billion user
accounts. Yahoo announced the first breach in 2016.
Equifax security breach
The data breach at Equifax, one of the nation’s largest credit
reporting companies, exposed the personal information of more
than 145 million Americans.
Cybercriminals exploited a website application vulnerability.
Unauthorized access to data occurred from between May and
July 2017. Equifax announced the cybersecurity incident on
September 7, 2017.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 12 / 13
13. Examples : security breach
Facebook security breach
Facebook, in September 2018, announced an attack on its
computer network. The personal information of nearly 29 million
users was exposed. Cybercriminals exploited three software flaws
in Facebook’s system.
Hackers were able to break into user accounts that included
those of Facebook CEO Mark Zuckerberg and Chief Operating
Officer Sheryl Sandberg.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 13 / 13