SlideShare a Scribd company logo
1 of 26
Hamimah bte Mohd Jamil




MUHAMMAD BIN MOHD SUKERI
(A13CS0068)
NURUL EMIRA BINTI ABDUL AZIZ
(A13CS0128)
WAN HAJARUL ASIKIN BINTI WAN
ZUNAIDI (A13CS0168)
PRIVACY
• Computing technology makes it possible to
collect and use our data.
• The website we visit is one of the way the data
collection.
• Would you matter if your personal
information is been shared ?
PRIMARY
PRIVACY
ISSUES

ACCURACY :Relates to the responsibility of those who collect the data is
correct
PROPERTY :who on data and right to the software
ACCESS :relates to the responsibility of those who have data to control who
is able to use it
LARGE DATABASE
• Large organisation are constantly compiling
information about us.
• There are about 2000 database
• Example : Telephone companies-compile lists of
the call we make.
• REVERSE DIRECTORY
list telephone
number followed by subscriber names.
• *insert picture
• *change title
• Information reseller(information broker) : Collect
and sell personal data. Electronic Profiles : are
compiled from database to provide highly detailed
and personalized descriptions of individual
• Our personal information has been a marketable
commodity. This raises many issues including :
1.COLLECTING PUBLIC,BUT PERSONALLY IDENTIFYING
INFORMATION.

2.SPREADING INFORMATION WITHOUT PERSONAL
CONSENT.

3.SPREADING INACCURATE INFORMATION
IDENTITY THEFT :
• Is the illegal assumption of someone’s
identity for the purpose of economic gain.

MISTAKEN IDENTITY :
• Occurs when an electronic profile of one
person is switched with another.
• INFORMATION OF INFORMATION ACT :
entitles individuals access to
governmental records relating to them.
Many organization monitor employee e-mail and
computer files using software called SNOOPWARE
Many people believe that, while using the web, little
can be done to invade their privacy. This is called the
illusion of anonymity
Record location of visited sites

Two basic type are TRADITIONAL COOKIES AND AD
NETWORK COOKIES(ADWARE COOKIES).
• TRADITIONAL COOKIES-Provide information to a single sites,a
cookies is deposited with the information that identifies specifically
• AD NETWORK(ADWARE COOKIES-Record your activities across
different sites.
• PRIVACY MODE(INPRIVATE BROWSING;PRIVATER BROWSING)eliminate history files and block cookies.
• SPYWARE-Secretly record and report internet activities.
• COMPUTER MONITORING(KEYSTROKE LOGGERS)-watches what
you do.
• WEB BUGS-Provide information back to spammers about activity
on e-mail account.
• ANTISPYWARE(SPY REMOVAL PROGRAM)-detect Web bug and
monitoring software.
GRAMM-LEACH-BLILEY ACT

• Protect personal financial information
HEALTH INSURANCE PROTABILITY AND
ACCOUNTABILITY ACT(HIPAA)

• Protect medical records
FAMILY EDUCATIONAL RIGHTS AND PRIVACY
ACT(FREPA)

• Restricts disclosure of educational records
• Computer criminal included employee , outside
users , hacker and crackers ,carders , organized
crime, and terrorist
• HACKER :Create or improve programs and shared
those program with fellow hackers . Typically are
not criminal.
• CRACKERS :Share programs designed to gain
unauthorized access computer systems or disrupt
networks.Typically are criminals.
• CARDERS :Specialize in stealing,trading and using
stolen credit cards over the internet.
Is an illegal action involving special knowledge
of computer technology
• CYBER-BULLYING : intended to hurt or embarrass
another person.
• ROGUE WI-FI HOTSPOT :Capture personal
information
• SCAMS : designed to trick people into spending
their time/money.
• DENIAL OF SERVICE ATTACK(DOS) : Is attempt to
shut down or stop a computer system/network.it
floods a computer or network with requests for
information and data.
• Theft : Takes many forms including stealing
hardware, software, data and computer time.
• Data manipulation : Involves changing data or
leaving prank messages .The Computer Fraud and
Abuse Act helps protect against data manipulation.
• MALICIOUS PROGRAMS (MALWARE) : Design to damage or
disrupt computer system.3 most common types of malware
are viruses, worms, and Trojan horses.
VIRUSES
• Some of the viruses are harmless while some of it can damaging our system
component.

WORMS
• It fill the computer a computer system with self replicating
information, clogging the system that is operation are slowed/stopped
• Typically find their way into microcomputer through e-mail
attached/programs downloaded from internet
Trojan horses
• Disguised as something else
• Not a viruses , but it carries viruses.
Zombies
• Remotely controlled infected computer for malicious purpose.
• A collection of zombies computer is known as botnet or robot network
NATURAL DISASTER:
• Included fires,flod,wind,hurricans and tornado.Even computer users should store
backup disk of programms and data in safe location.
CIVIL STRIFE AND TERRORISM:
• Wars,riot,and terrorist activities are real risks in all parts of the world.
TECHNOLOGICAL FAILURES:
• Microcomputer should use a surge protector,a divice that separate the computer
from the power source of the wall outlet.This may protect the computer
HUMAN ERRORS:
• Human mistakes are inevitable.Data entry errors are probably the most
commonplace could lead to mistaken identity.
• Occur when office workers save important documents under files names that are
not descriptive and not recognizable by others
RESTRICTING ACCESS :
Sometimes security matter of putting guards on
company computer rooms and checking the
identification of everyone admitted.Other times it use
biometric scanning such as fingerprint and iris.
Password are secret words or phrases that must be
keyed into a computer system to gain access.
E-MAIL ENCRYPTING : Protect e-mails messages as the moves
across the internet.
FILE ENCRYPTING :Protects sensitive files by encrypting them
before they stored on a hard drive.
WEB SITES ENCRYPTING :Secures Web transaction,especially
financial transaction
VIRTUAL PRIVATE NETWORK(VPN) :Encrypt connections
between company networks and remote users such as
workers connecting from home
WIRELESS NETWORK ENCRYPTING :Restricts access to
authorized uses on wireless network.WEA(WIRED
EQUIVALENT PRIVACY) is one of the best-known wireless
encryption protocols.
Ethics ?
 Standards of moral products.
-the right to keep personal information, such as credit
ratings and medical histories, from getting into
unauthorized hands.
2 important issues in computer ethics.
1. Copyright and Digital Right Management

2. Plagiarism
• Gives content creators the right to control the
use and distribution of their work.
Example of materials :
• Paintings , books , music, films , video games.

Others : make unauthorized copies
• Digital media. (violates copyright)
• Is the unauthorized copying and distribution of software.

Digital Millennium Copyright Act
-established the right of the program owner to make a backup
copy and disallow the creation of copies.
-illegal to download copyright-protected music and videos from
Internet.

Digital rights management (DRM)
-collection of technologies designed to prevent copyright
violations.
-control the number of devices that can access given file.
-limits the kinds of devices that can access a file.
• The illegal and unethical representation of
some other person’s work and ideas as your
own without giving credit to the original
source.
• Example :
cutting &
pasting Web content
into a report or paper.
Cryptographers design encryption algorithms,
break codes, and provide support to nasional
security efforts.
 PhD in mathematics and broad experience in
computer science are required.
Salary range is $60.000 to over $100,000.
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation

More Related Content

What's hot

Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Information security
Information securityInformation security
Information securityMustahid Ali
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy controlSifat Hossain
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security lawsNasir Bhutta
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 

What's hot (20)

Information security management system
Information security management systemInformation security management system
Information security management system
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Information security threats
Information security threatsInformation security threats
Information security threats
 
Information security
Information securityInformation security
Information security
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Security policies
Security policiesSecurity policies
Security policies
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 

Viewers also liked

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 

Viewers also liked (6)

Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 

Similar to Privacy , Security and Ethics Presentation

Similar to Privacy , Security and Ethics Presentation (20)

Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
sc.pptx
sc.pptxsc.pptx
sc.pptx
 
UNIT V.pptx
UNIT V.pptxUNIT V.pptx
UNIT V.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Privacy , Security and Ethics Presentation

  • 1. Hamimah bte Mohd Jamil    MUHAMMAD BIN MOHD SUKERI (A13CS0068) NURUL EMIRA BINTI ABDUL AZIZ (A13CS0128) WAN HAJARUL ASIKIN BINTI WAN ZUNAIDI (A13CS0168)
  • 2.
  • 3. PRIVACY • Computing technology makes it possible to collect and use our data. • The website we visit is one of the way the data collection. • Would you matter if your personal information is been shared ? PRIMARY PRIVACY ISSUES ACCURACY :Relates to the responsibility of those who collect the data is correct PROPERTY :who on data and right to the software ACCESS :relates to the responsibility of those who have data to control who is able to use it
  • 4. LARGE DATABASE • Large organisation are constantly compiling information about us. • There are about 2000 database • Example : Telephone companies-compile lists of the call we make. • REVERSE DIRECTORY list telephone number followed by subscriber names. • *insert picture • *change title
  • 5. • Information reseller(information broker) : Collect and sell personal data. Electronic Profiles : are compiled from database to provide highly detailed and personalized descriptions of individual • Our personal information has been a marketable commodity. This raises many issues including : 1.COLLECTING PUBLIC,BUT PERSONALLY IDENTIFYING INFORMATION. 2.SPREADING INFORMATION WITHOUT PERSONAL CONSENT. 3.SPREADING INACCURATE INFORMATION
  • 6. IDENTITY THEFT : • Is the illegal assumption of someone’s identity for the purpose of economic gain. MISTAKEN IDENTITY : • Occurs when an electronic profile of one person is switched with another. • INFORMATION OF INFORMATION ACT : entitles individuals access to governmental records relating to them.
  • 7. Many organization monitor employee e-mail and computer files using software called SNOOPWARE Many people believe that, while using the web, little can be done to invade their privacy. This is called the illusion of anonymity Record location of visited sites Two basic type are TRADITIONAL COOKIES AND AD NETWORK COOKIES(ADWARE COOKIES).
  • 8. • TRADITIONAL COOKIES-Provide information to a single sites,a cookies is deposited with the information that identifies specifically • AD NETWORK(ADWARE COOKIES-Record your activities across different sites. • PRIVACY MODE(INPRIVATE BROWSING;PRIVATER BROWSING)eliminate history files and block cookies. • SPYWARE-Secretly record and report internet activities. • COMPUTER MONITORING(KEYSTROKE LOGGERS)-watches what you do. • WEB BUGS-Provide information back to spammers about activity on e-mail account. • ANTISPYWARE(SPY REMOVAL PROGRAM)-detect Web bug and monitoring software.
  • 9. GRAMM-LEACH-BLILEY ACT • Protect personal financial information HEALTH INSURANCE PROTABILITY AND ACCOUNTABILITY ACT(HIPAA) • Protect medical records FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT(FREPA) • Restricts disclosure of educational records
  • 10.
  • 11. • Computer criminal included employee , outside users , hacker and crackers ,carders , organized crime, and terrorist • HACKER :Create or improve programs and shared those program with fellow hackers . Typically are not criminal. • CRACKERS :Share programs designed to gain unauthorized access computer systems or disrupt networks.Typically are criminals. • CARDERS :Specialize in stealing,trading and using stolen credit cards over the internet.
  • 12. Is an illegal action involving special knowledge of computer technology • CYBER-BULLYING : intended to hurt or embarrass another person. • ROGUE WI-FI HOTSPOT :Capture personal information • SCAMS : designed to trick people into spending their time/money.
  • 13. • DENIAL OF SERVICE ATTACK(DOS) : Is attempt to shut down or stop a computer system/network.it floods a computer or network with requests for information and data. • Theft : Takes many forms including stealing hardware, software, data and computer time. • Data manipulation : Involves changing data or leaving prank messages .The Computer Fraud and Abuse Act helps protect against data manipulation.
  • 14. • MALICIOUS PROGRAMS (MALWARE) : Design to damage or disrupt computer system.3 most common types of malware are viruses, worms, and Trojan horses. VIRUSES • Some of the viruses are harmless while some of it can damaging our system component. WORMS • It fill the computer a computer system with self replicating information, clogging the system that is operation are slowed/stopped • Typically find their way into microcomputer through e-mail attached/programs downloaded from internet Trojan horses • Disguised as something else • Not a viruses , but it carries viruses. Zombies • Remotely controlled infected computer for malicious purpose. • A collection of zombies computer is known as botnet or robot network
  • 15. NATURAL DISASTER: • Included fires,flod,wind,hurricans and tornado.Even computer users should store backup disk of programms and data in safe location. CIVIL STRIFE AND TERRORISM: • Wars,riot,and terrorist activities are real risks in all parts of the world. TECHNOLOGICAL FAILURES: • Microcomputer should use a surge protector,a divice that separate the computer from the power source of the wall outlet.This may protect the computer HUMAN ERRORS: • Human mistakes are inevitable.Data entry errors are probably the most commonplace could lead to mistaken identity. • Occur when office workers save important documents under files names that are not descriptive and not recognizable by others
  • 16. RESTRICTING ACCESS : Sometimes security matter of putting guards on company computer rooms and checking the identification of everyone admitted.Other times it use biometric scanning such as fingerprint and iris. Password are secret words or phrases that must be keyed into a computer system to gain access.
  • 17. E-MAIL ENCRYPTING : Protect e-mails messages as the moves across the internet. FILE ENCRYPTING :Protects sensitive files by encrypting them before they stored on a hard drive. WEB SITES ENCRYPTING :Secures Web transaction,especially financial transaction VIRTUAL PRIVATE NETWORK(VPN) :Encrypt connections between company networks and remote users such as workers connecting from home WIRELESS NETWORK ENCRYPTING :Restricts access to authorized uses on wireless network.WEA(WIRED EQUIVALENT PRIVACY) is one of the best-known wireless encryption protocols.
  • 18.
  • 19. Ethics ?  Standards of moral products. -the right to keep personal information, such as credit ratings and medical histories, from getting into unauthorized hands.
  • 20. 2 important issues in computer ethics. 1. Copyright and Digital Right Management 2. Plagiarism
  • 21. • Gives content creators the right to control the use and distribution of their work. Example of materials : • Paintings , books , music, films , video games. Others : make unauthorized copies • Digital media. (violates copyright)
  • 22. • Is the unauthorized copying and distribution of software. Digital Millennium Copyright Act -established the right of the program owner to make a backup copy and disallow the creation of copies. -illegal to download copyright-protected music and videos from Internet. Digital rights management (DRM) -collection of technologies designed to prevent copyright violations. -control the number of devices that can access given file. -limits the kinds of devices that can access a file.
  • 23. • The illegal and unethical representation of some other person’s work and ideas as your own without giving credit to the original source. • Example : cutting & pasting Web content into a report or paper.
  • 24. Cryptographers design encryption algorithms, break codes, and provide support to nasional security efforts.  PhD in mathematics and broad experience in computer science are required. Salary range is $60.000 to over $100,000.