SlideShare a Scribd company logo
1 of 13
Download to read offline
Lecture #22: Web Privacy & Security Breach
Dr.Ramchandra Mangrulkar
September 17, 2020
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 1 / 13
Web Privacy
A user can visit websites, send messages, and interact with
applications without revealing an identity. True or False ?
Internet privacy is becoming a growing concern these days for
people of all ages.
Companies track your behavior across websites to serve you with
highly relevant advertisements.
Governments monitor every move you make to predict your
behavior and control you better.
Instant connectivity has changed the way we live and work for
the better, but this convenience comes at a very big price:
your privacy!
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 2 / 13
What is Internet Privacy of Web Privacy?
Internet privacy, also commonly referred to as online privacy, is a
subset of data privacy and a fundamental human right.
Basically, it refers to the personal privacy that you’re entitled to
when you display, store, or provide information regarding yourself
on the Internet.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 3 / 13
Internet Privacy Issues
Tracking
-based on your earlier web searches or visits to websites.
Surveillance
-allows the government to legally monitor the Internet usage of
its citizens.
Theft
-Cybercriminals use malware, spyware, and phishing techniques
for Identity Theft
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 4 / 13
Behaviors That Impact Privacy
Using the Same Credentials for Multiple Accounts
Staying Logged into Websites
Using Services without Reading their Terms Conditions
Opening Suspicious Attachments or Downloading Malicious Files
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 5 / 13
Protecting Privacy
Clean computing matters
-Backing up your data
-Protect against malware
-Regularly Update software
-Update your passwords
Check and remove digital footprint
-Search Name in search engines
-Double-check your privacy settings
Educate yourself and your family about social networking
Wipe digital data
social media privacy -read Terms and Conditions
-don’t share private information
-careful about posting photos
-Adjust the social media platform’s privacy
-Know personal data, social media sites store and share
-Carefully select personal details
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 6 / 13
Protecting Privacy : Tips
Don’t overshare on social media
Create strong passwords
Browse in incognito or private mode
Use a different search engine
Use a virtual private network
Secure Your Web Browser
Be careful where you click
Secure your mobile devices
Use quality antivirus software
Delete Cookies at Browser Exit
Use HTTPS
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 7 / 13
Protecting Privacy : Tips
Encrypt data during Cloud Backup
Secure Online Communications
Share Online Files Securely
Watch Bluetooth vulnerabilities
Keep operating system up to date
Wise up to Wi-Fi
Delete unused data
Familiarize with phishing
Block Cookies
Unlink Accounts
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 8 / 13
Security Breatch
A security breach occurs when an intruder gains unauthorized access
to an organization’s protected systems and data.
Cybercriminals or malicious applications bypass security mechanisms
to reach restricted areas.
A security breach is an early-stage violation that can lead to things
like system damage and data loss.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 9 / 13
Security Breatch
Attackers can initiate different types of security breaches.
Viruses, spyware, and other malware -Cybercriminals often use
malicious software to break in to protected networks.
Impersonation of an organization
-Cybercriminals may send a bogus, but convincing email to an
employee of an organization
-The email is made to appear like it’s from an executive with an
urgent request for, say, employment records, log-in information,
or other sensitive data.
-Eager to fill the request, the employee may email back the
information — putting it in the hands of cybercriminals.
Denial of service (DDoS) attacks
-A denial-of-service attack is capable of crashing websites
-Hackers can make a website — or a computer — unavailable by
flooding it with traffic.
-overwhelm an organization’s security devices and its ability to
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 10 / 13
Security breach or data breach?
A security breach happens first. A data breach may follow.
A security breach occurs when an unauthorized party bypasses
security measures to reach protected areas of a system.
A security breach can put the intruder within reach of valuable
information — company accounts, intellectual property, the
personal information of customers that might include names,
addresses, Social Security numbers, and credit card information.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 11 / 13
Examples : security breach
A security breach happens first. A data breach may follow.
The Yahoo security breach began with a spear-phishing email
sent in early 2014. A Yahoo company employee clicked on a link,
giving hackers access to the company’s network. Three Yahoo
breaches in total gave cybercriminals access to 3 billion user
accounts. Yahoo announced the first breach in 2016.
Equifax security breach
The data breach at Equifax, one of the nation’s largest credit
reporting companies, exposed the personal information of more
than 145 million Americans.
Cybercriminals exploited a website application vulnerability.
Unauthorized access to data occurred from between May and
July 2017. Equifax announced the cybersecurity incident on
September 7, 2017.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 12 / 13
Examples : security breach
Facebook security breach
Facebook, in September 2018, announced an attack on its
computer network. The personal information of nearly 29 million
users was exposed. Cybercriminals exploited three software flaws
in Facebook’s system.
Hackers were able to break into user accounts that included
those of Facebook CEO Mark Zuckerberg and Chief Operating
Officer Sheryl Sandberg.
Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 13 / 13

More Related Content

What's hot

A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...Cognizant
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the worldSeqrite
 
A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment Victor Oluwajuwon Badejo
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicUlf Mattsson
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingSeqrite
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
Current Issue: February 2020, Volume 10, Number 1 --- Table of Contents
Current Issue: February 2020, Volume 10, Number 1 --- Table of ContentsCurrent Issue: February 2020, Volume 10, Number 1 --- Table of Contents
Current Issue: February 2020, Volume 10, Number 1 --- Table of ContentsIJCSEA Journal
 
Web security presentation
Web security presentationWeb security presentation
Web security presentationJohn Staveley
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...IJNSA Journal
 
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnottsWeb security leeds sharp dot netnotts
Web security leeds sharp dot netnottsJohn Staveley
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET Journal
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacksJohn Davis
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Alexander Decker
 
IRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET Journal
 

What's hot (20)

Case study on JP Morgan Chase & Co
Case study on JP Morgan Chase & CoCase study on JP Morgan Chase & Co
Case study on JP Morgan Chase & Co
 
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...A Multidimensional View of Critical Web Application Security Risks: A Novel '...
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment A Case study scenario on collaborative Portal Risk Assessment
A Case study scenario on collaborative Portal Risk Assessment
 
Web Security
Web SecurityWeb Security
Web Security
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
C02
C02C02
C02
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus Pandemic
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
Current Issue: February 2020, Volume 10, Number 1 --- Table of Contents
Current Issue: February 2020, Volume 10, Number 1 --- Table of ContentsCurrent Issue: February 2020, Volume 10, Number 1 --- Table of Contents
Current Issue: February 2020, Volume 10, Number 1 --- Table of Contents
 
Web security presentation
Web security presentationWeb security presentation
Web security presentation
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
Web security leeds sharp dot netnotts
Web security leeds sharp dot netnottsWeb security leeds sharp dot netnotts
Web security leeds sharp dot netnotts
 
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine LearningIRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)Detecting phishing websites using associative classification (2)
Detecting phishing websites using associative classification (2)
 
IRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application VulnerabilitiesIRJET- Survey on Web Application Vulnerabilities
IRJET- Survey on Web Application Vulnerabilities
 

Similar to Lecture #22: Web Privacy & Security Breach

Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptxBetaBeta9
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protectionBavijesh Thaliyil
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutionsmaryrowling
 
A Cybersecurity and Digital Risk Assessment: A Family Case Study
A Cybersecurity and Digital Risk Assessment: A Family Case StudyA Cybersecurity and Digital Risk Assessment: A Family Case Study
A Cybersecurity and Digital Risk Assessment: A Family Case StudyCSEIJJournal
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security PresentationPreethi Kumaresh
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfJayaMalaR6
 

Similar to Lecture #22: Web Privacy & Security Breach (20)

Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptx
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Cyber law and password protection
Cyber law and password protectionCyber law and password protection
Cyber law and password protection
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
A Cybersecurity and Digital Risk Assessment: A Family Case Study
A Cybersecurity and Digital Risk Assessment: A Family Case StudyA Cybersecurity and Digital Risk Assessment: A Family Case Study
A Cybersecurity and Digital Risk Assessment: A Family Case Study
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
CYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdfCYBER SECURITY (R18A0521).pdf
CYBER SECURITY (R18A0521).pdf
 

More from Dr. Ramchandra Mangrulkar

Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Dr. Ramchandra Mangrulkar
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityDr. Ramchandra Mangrulkar
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Dr. Ramchandra Mangrulkar
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Dr. Ramchandra Mangrulkar
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part IDr. Ramchandra Mangrulkar
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity ManagementDr. Ramchandra Mangrulkar
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityDr. Ramchandra Mangrulkar
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityDr. Ramchandra Mangrulkar
 

More from Dr. Ramchandra Mangrulkar (20)

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
 
Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
 
Blockchain#3.pdf
Blockchain#3.pdfBlockchain#3.pdf
Blockchain#3.pdf
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
 
Lecture #6: Multilevel Security Models
Lecture #6: Multilevel Security ModelsLecture #6: Multilevel Security Models
Lecture #6: Multilevel Security Models
 
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel SecurityLecture #7: Bell Lapdula and Biba Model of Multilevel Security
Lecture #7: Bell Lapdula and Biba Model of Multilevel Security
 
Lecture #4: Access Control Policies
Lecture #4: Access Control PoliciesLecture #4: Access Control Policies
Lecture #4: Access Control Policies
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

Lecture #22: Web Privacy & Security Breach

  • 1. Lecture #22: Web Privacy & Security Breach Dr.Ramchandra Mangrulkar September 17, 2020 Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 1 / 13
  • 2. Web Privacy A user can visit websites, send messages, and interact with applications without revealing an identity. True or False ? Internet privacy is becoming a growing concern these days for people of all ages. Companies track your behavior across websites to serve you with highly relevant advertisements. Governments monitor every move you make to predict your behavior and control you better. Instant connectivity has changed the way we live and work for the better, but this convenience comes at a very big price: your privacy! Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 2 / 13
  • 3. What is Internet Privacy of Web Privacy? Internet privacy, also commonly referred to as online privacy, is a subset of data privacy and a fundamental human right. Basically, it refers to the personal privacy that you’re entitled to when you display, store, or provide information regarding yourself on the Internet. Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 3 / 13
  • 4. Internet Privacy Issues Tracking -based on your earlier web searches or visits to websites. Surveillance -allows the government to legally monitor the Internet usage of its citizens. Theft -Cybercriminals use malware, spyware, and phishing techniques for Identity Theft Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 4 / 13
  • 5. Behaviors That Impact Privacy Using the Same Credentials for Multiple Accounts Staying Logged into Websites Using Services without Reading their Terms Conditions Opening Suspicious Attachments or Downloading Malicious Files Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 5 / 13
  • 6. Protecting Privacy Clean computing matters -Backing up your data -Protect against malware -Regularly Update software -Update your passwords Check and remove digital footprint -Search Name in search engines -Double-check your privacy settings Educate yourself and your family about social networking Wipe digital data social media privacy -read Terms and Conditions -don’t share private information -careful about posting photos -Adjust the social media platform’s privacy -Know personal data, social media sites store and share -Carefully select personal details Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 6 / 13
  • 7. Protecting Privacy : Tips Don’t overshare on social media Create strong passwords Browse in incognito or private mode Use a different search engine Use a virtual private network Secure Your Web Browser Be careful where you click Secure your mobile devices Use quality antivirus software Delete Cookies at Browser Exit Use HTTPS Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 7 / 13
  • 8. Protecting Privacy : Tips Encrypt data during Cloud Backup Secure Online Communications Share Online Files Securely Watch Bluetooth vulnerabilities Keep operating system up to date Wise up to Wi-Fi Delete unused data Familiarize with phishing Block Cookies Unlink Accounts Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 8 / 13
  • 9. Security Breatch A security breach occurs when an intruder gains unauthorized access to an organization’s protected systems and data. Cybercriminals or malicious applications bypass security mechanisms to reach restricted areas. A security breach is an early-stage violation that can lead to things like system damage and data loss. Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 9 / 13
  • 10. Security Breatch Attackers can initiate different types of security breaches. Viruses, spyware, and other malware -Cybercriminals often use malicious software to break in to protected networks. Impersonation of an organization -Cybercriminals may send a bogus, but convincing email to an employee of an organization -The email is made to appear like it’s from an executive with an urgent request for, say, employment records, log-in information, or other sensitive data. -Eager to fill the request, the employee may email back the information — putting it in the hands of cybercriminals. Denial of service (DDoS) attacks -A denial-of-service attack is capable of crashing websites -Hackers can make a website — or a computer — unavailable by flooding it with traffic. -overwhelm an organization’s security devices and its ability to Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 10 / 13
  • 11. Security breach or data breach? A security breach happens first. A data breach may follow. A security breach occurs when an unauthorized party bypasses security measures to reach protected areas of a system. A security breach can put the intruder within reach of valuable information — company accounts, intellectual property, the personal information of customers that might include names, addresses, Social Security numbers, and credit card information. Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 11 / 13
  • 12. Examples : security breach A security breach happens first. A data breach may follow. The Yahoo security breach began with a spear-phishing email sent in early 2014. A Yahoo company employee clicked on a link, giving hackers access to the company’s network. Three Yahoo breaches in total gave cybercriminals access to 3 billion user accounts. Yahoo announced the first breach in 2016. Equifax security breach The data breach at Equifax, one of the nation’s largest credit reporting companies, exposed the personal information of more than 145 million Americans. Cybercriminals exploited a website application vulnerability. Unauthorized access to data occurred from between May and July 2017. Equifax announced the cybersecurity incident on September 7, 2017. Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 12 / 13
  • 13. Examples : security breach Facebook security breach Facebook, in September 2018, announced an attack on its computer network. The personal information of nearly 29 million users was exposed. Cybercriminals exploited three software flaws in Facebook’s system. Hackers were able to break into user accounts that included those of Facebook CEO Mark Zuckerberg and Chief Operating Officer Sheryl Sandberg. Dr.Ramchandra Mangrulkar Lecture #22: Web Privacy & Security Breach September 17, 2020 13 / 13