Cyber privacy refers to protecting personal data and information published online. It involves techniques and technologies to secure sensitive data from crimes like malware, denial of service attacks, and computer viruses. Privacy protection relies on effective cyber security by organizations to secure data as it is transmitted and stored. Crimes against cyber privacy include fraud, identity theft, and information theft. Effective cyber security and privacy protection are increasingly important as individuals and organizations become more connected online.
1. Cyber Privacy and
Password protection
Cyber Privacy and
Password protection
Bavijesh Thaliyil
M.Ed, Dept. of Education
University of Kerala
2. Cyber privacy is the privacy and security level of personal data published
via the Internet. It is a broad term that refers to a variety of factors,
techniques and technologies used to protect sensitive and private data,
communications, and preferences.
CCyber-Privacy is mostly defined by the services used by
individuals. Whatever agreements individuals agree to when
they sign up for a service usually signs away their right to
privacy. In other cases the reasonable expectation of privacy is
not reasonable if the behaviors or communications in question
were knowingly exposed to public view.
“
”
Cyber Privacy – A PraludeCyber Privacy – A Pralude
3. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Cyber-Privacy is a huge concern for civilians and espeically for companies
because of the potential for crime.
Such crimes include:
Malware
such as the use of
malicious code which can
compromise a user's
identity and/or informaton
Denial of Service Attacks
Block a user from
accessing his or her
information
Computer Viruses
Can compromise user
information as well as
identity
All of these crimes fall under the category or
fraud, identity theft, phishing scams and or
information warfare.
4. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
The Cyber-Privacy Project attempts to raise public awareness and promote
the education of Cyber Privacy to prevent crimes from happening.
Privacy protection and cyber security should be thought of as
interconnected: as more and more personal information is processed or stored
online, privacy protection increasingly relies on effective cyber security
implementation by organizations to secure personal data both when it is in
transit and at rest.17 In some cases, cyber security measures underpin critical
infrastructure that protects data, thereby safeguarding personal information
5. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Credit-card fraud
Data communications fraud
Piggyback on someone else’s network
Office network for personal purposes
Computer-directed diversion of funds
Unauthorized access to computer files
Accessing confidential employee records
Theft of trade secrets and product pricing
Unlawful copying of copyrighted software
Casual sharing of copyrighted software
Assembly-line copying
6. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Bomb
Program to trigger damage
• Scheduled to run at a later date
• May be found in software for general public, especially shareware
Data diddling
• Changing data before or as it enters the system
Denial of service attack (DOS)
• Hackers bombard a site with more request for service than it can
possible handle
• Prevents legitimate users from accessing the site
• Appearance of requests coming from many different sites simultaneously
7. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Piggybacking
Original user does not sign off properly
Intruder gains accesses to files via the original user id
Salami technique
Embezzlement
Scavenging
Search garbage and recycling bins for personal information
8. Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Trapdoor
Illicit program left within a completed legitimate program
Permits unauthorized and unknown entry to the program
Trojan horse
Illegal instructions placed inside a legitimate program
Program does something useful and destructive at the same
time
Zapping
Software to bypass security systems
9. Crimes Security - ChallengesCrimes Security - Challenges
Social MediasSocial Medias MobileMobile
TechnologyTechnology
Big DataBig Data
10. Cyber Chellenges - ComplexityCyber Chellenges - Complexity
Complexity of the connected environment
Growing sophistication of the threat
Threats are moving to the mobile sphere
The “big data” paradox: is it a bigger risk or a solution?
For many, breach preparedness is still not a priority
Compliance vs risk-management
11. Cyber Security – Policy DevelopmentCyber Security – Policy Development
Stewardship vs securitization
Cyberspace governance and security is a global issue
12. ConclusionConclusion
As individuals grow more dependent on and connected to the cyberspace,
they will become more reliant on organizations’ effective implementation of
cyber security and sensitivity to privacy. The following are some of the key
areas in which an increased emphasis on privacy protection could help
support, advance and augment cyber security activities
Building privacy values into cyber security policy directions
Legislative approaches that incentivize cyber security preparedness
Facilitating broader dialogue on cyber security that acknowledges its
importance for privacy, trust, and responsible data stewardship