SlideShare a Scribd company logo
1 of 5
The Effects Of The Use Of On-Line Services On Security & Privacy of Data   Mr. Powell
Need to protect confidentiality of data  ,[object Object],[object Object],[object Object],[object Object]
Data protection legislation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social and ethical implications ,[object Object],[object Object],[object Object],[object Object],[object Object]
Security Measures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of DataMISY
 
3. use of ict in time management
3. use of ict in time management3. use of ict in time management
3. use of ict in time managementMISY
 
2b working practices
2b working practices2b working practices
2b working practicesMISY
 
Robots and cars ca
Robots and cars caRobots and cars ca
Robots and cars caMISY
 
Ict in advertising ca
Ict in advertising caIct in advertising ca
Ict in advertising caMISY
 
Payroll applications new
Payroll applications newPayroll applications new
Payroll applications newMISY
 
Use of ict in advertising
Use of ict in advertisingUse of ict in advertising
Use of ict in advertisingMISY
 
Data management new
Data management newData management new
Data management newMISY
 
Uses of dbms
Uses of dbmsUses of dbms
Uses of dbmsMISY
 

Viewers also liked (9)

3e - Security Of Data
3e - Security Of Data3e - Security Of Data
3e - Security Of Data
 
3. use of ict in time management
3. use of ict in time management3. use of ict in time management
3. use of ict in time management
 
2b working practices
2b working practices2b working practices
2b working practices
 
Robots and cars ca
Robots and cars caRobots and cars ca
Robots and cars ca
 
Ict in advertising ca
Ict in advertising caIct in advertising ca
Ict in advertising ca
 
Payroll applications new
Payroll applications newPayroll applications new
Payroll applications new
 
Use of ict in advertising
Use of ict in advertisingUse of ict in advertising
Use of ict in advertising
 
Data management new
Data management newData management new
Data management new
 
Uses of dbms
Uses of dbmsUses of dbms
Uses of dbms
 

More from MISY

Ict in time management ca
Ict in time management caIct in time management ca
Ict in time management caMISY
 
Ict in publishing ca
Ict in publishing caIct in publishing ca
Ict in publishing caMISY
 
Ict in teaching learning ca
Ict in teaching  learning caIct in teaching  learning ca
Ict in teaching learning caMISY
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data ProtectionMISY
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3d - Working Practices
3d - Working Practices3d - Working Practices
3d - Working PracticesMISY
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical IssuesMISY
 
1ab Input Output Devices
1ab   Input Output Devices1ab   Input Output Devices
1ab Input Output DevicesMISY
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers OverviewMISY
 
1cd Output
1cd   Output1cd   Output
1cd OutputMISY
 
1gh Role Of Communications Systems
1gh   Role Of Communications Systems1gh   Role Of Communications Systems
1gh Role Of Communications SystemsMISY
 
1f Backup
1f   Backup1f   Backup
1f BackupMISY
 
Ie Storage, Multimedia And File Organization
Ie   Storage, Multimedia And File OrganizationIe   Storage, Multimedia And File Organization
Ie Storage, Multimedia And File OrganizationMISY
 
Ie Storage Devices
Ie   Storage DevicesIe   Storage Devices
Ie Storage DevicesMISY
 

More from MISY (14)

Ict in time management ca
Ict in time management caIct in time management ca
Ict in time management ca
 
Ict in publishing ca
Ict in publishing caIct in publishing ca
Ict in publishing ca
 
Ict in teaching learning ca
Ict in teaching  learning caIct in teaching  learning ca
Ict in teaching learning ca
 
3e - Data Protection
3e - Data Protection3e - Data Protection
3e - Data Protection
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3d - Working Practices
3d - Working Practices3d - Working Practices
3d - Working Practices
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
1ab Input Output Devices
1ab   Input Output Devices1ab   Input Output Devices
1ab Input Output Devices
 
One Computers Overview
One   Computers OverviewOne   Computers Overview
One Computers Overview
 
1cd Output
1cd   Output1cd   Output
1cd Output
 
1gh Role Of Communications Systems
1gh   Role Of Communications Systems1gh   Role Of Communications Systems
1gh Role Of Communications Systems
 
1f Backup
1f   Backup1f   Backup
1f Backup
 
Ie Storage, Multimedia And File Organization
Ie   Storage, Multimedia And File OrganizationIe   Storage, Multimedia And File Organization
Ie Storage, Multimedia And File Organization
 
Ie Storage Devices
Ie   Storage DevicesIe   Storage Devices
Ie Storage Devices
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

3e - The Effects Of The Use Of On Line Services On Security & Privacy

  • 1. The Effects Of The Use Of On-Line Services On Security & Privacy of Data Mr. Powell
  • 2.
  • 3.
  • 4.
  • 5.

Editor's Notes

  1. Confidentiality is ensuring that information is accessible only to those of information security. Confidentiality is maintained in most on-line systems by the techniques of modern cryptography. User and payment data is encrypted by SSL when it is transferred on the Internet. Quality seals can be placed on the Shop webpage if it has undergone an independent assessment and meets all requirements of the company issuing the seal. The purpose of these seals is to increase the confidence of the online shoppers; the existence of many different seals foils this effort to a certain extent. The ability of the online merchant to determine the identity of the purchaser is still the major security issue. Repudiations (disownership) of involvement with online transactions can happen even 6 months after the date of transaction. Privacy of personal information is a big issue. In spite of Privacy Guidelines of the OECD , for example, privacy violations still occur and hamper eCommerce from developing to its full potential.
  2. Data protection legislation Data protection acts exist in most countries. These set down rules for keeping data private as well as confidential. UK Data Protection Act. The development of new technology has meant that many organisations store and process personal details on computer.  This may be data on customers, employees, suppliers, competitors, etc.  This has worried many people whose main concerns are: Who will be able to access this data?   Will information about me be available over the Internet, and therefore vulnerable to hackers?  Can my records be sold on to someone else? Is the data accurate? If it is stored, processed and transmitted by computer, who will check that it is accurate? People often think it must be true if 'it says so on the computer'. Will the data be sold on to another company? For example, could my health records be sold to a company where I have applied for a job? Could my personal details, collected by my employer, be used by a commercial company for targeting junk mail? Will data about me be stored even if it is not needed? If the original reason for having the data has passed, can the data still be kept? There was an earlier Data Protection Act in 1984 which set out to address some of these problems.  However, technology had moved on, and it was found that many things were no longer covered by this Act.  Therefore, in 1998, an updated version was passed.
  3. Social and ethical implications of access to personal information Duty of confidence – Everyone working for or with an organization that records, handles, stores or otherwise comes across information has a personal common law duty of confidence to clients and to his or her employer. Responsibilities for passing on information – Organization are accountable for their decisions to pass on information. Only the minimum identifiable information should be used. Anonymised information – Where anonymised information would be sufficient for a particular purpose, identifiable information should be omitted wherever possible. Aggregated information – aggregating selective information about a small number of clients may not always safeguard confidence adequately. If confidence is breached – Organization are strongly advised to include a duty of confidence requirement in employment contracts. Clients who feel that confidence has been breached should be able to use complaints procedures against the organization. Give some example of how large organization such as the UK NHS deals with confidentiality.
  4. E4-Need for security Security measures – under the Data Protection Act security measures must be in place with an organization to protect computerized information. Protection through single password authentication , as is the case in most secure Internet shopping sites, is not considered secure enough for personal online banking applications in some countries. Online banking user interfaces are secure sites (generally employing the https protocol) and traffic of all information - including the password - is encrypted, making it next to impossible for a third party to obtain or modify information after it is sent. However, encryption alone does not rule out the possibility of hackers gaining access to vulnerable home PCs and intercepting the password as it is typed in ( keystroke logging ). There is also the danger of password cracking and physical theft of passwords written down by careless users. Many online banking services therefore impose a second layer of security . Strategies vary, but a common method is the use of transaction numbers, or TANs , which are essentially single use passwords. Another strategy is the use of two passwords, only random parts of which are entered at the start of every online banking session. This is however slightly less secure than the TAN alternative and more inconvenient for the user. A third option, used in many European countries and currently being trialled in the UK is providing customers with security token devices capable of generating single use passwords unique to the customer's token (this is called two-factor authentication or 2FA). Another option is using digital certificates , which digitally sign or authenticate the transactions, by linking them to the physical device (e.g. computer, mobile phone , etc). Fraud Some customers avoid online banking as they perceive it as being too vulnerable to fraud. The security measures employed by most banks can never be completely safe, but in practice the number of fraud victims due to online banking is very small. This is probably due to the fact that a relatively small number of people use Internet banking compared with the total number of banking customers world wide. Indeed, conventional banking practices may be more prone to abuse by fraudsters than online banking[ Who says this? ]. Credit card fraud , signature forgery and identity theft are far more widespread "offline" crimes than malicious hacking . Bank transactions are generally traceable and criminal penalties for bank fraud are high. Online banking becomes less secure if users are careless, gullible or computer illiterate. An increasingly popular criminal practice to gain access to a user's finances is phishing , whereby the user is in some way persuaded to hand over their password(s) to a fraudster.