SlideShare a Scribd company logo
Privacy Issues and Internet Privacy By, Vinyas S
Information technology       -> Collects, stores, integrates and retrieves   	    data and information Store and Retrieve information!!! 	    -> a Negative impact on right to Privacy??? Introduction
The ability of an individual or group to secluded themselves or information about themselves and thereby reveal it selectively A personal, subjective condition. One person cannot decide for another what his or her sense of privacy should be Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public What Is Privacy? 6/9/2011 3
Violation of Privacy Computer Monitoring Computer Matching Unauthorized Personal Files Eg. for Privacy Issues
How our Personal Information Gets Revealed 6/9/2011 5
Internet Service Providers (ISP) always know your IP address and the IP address to which you are communicating ISPs are capable of observing unencrypted data passing between you and the Internet, but not properly-encrypted data    They are usually prevented to do so due to social pressure and law. By ISP 6/9/2011 7
May be inappropriately spread by the original receiver    May be intercepted May be legally viewed or disclosed by service providers or authorities By Email 6/9/2011 8
Any member of the list or group could collect and distribute your Email address and information you post By Discussion groups 6/9/2011 9
Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries and password  You may accidentally reveal such information when using a browser on a public computer or someone else's. By Internet Browsers 6/9/2011 10
Cookies are data packets sent by a server to a web client and then sent back unchanged by the client each time it accesses that server Cookies are used for authenticating, session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts Cookies are only data, not programs nor viruses What are cookies? 6/9/2011 11
A Sample of Cookie 6/9/2011 12 -->If you type JavaScript:alert(document.cookie)into the address bar, when logged onto a site, it is possible to see the cookies which have been set from that domain.
Search engines have and use the ability to track each one of your searches (e.g. ,IP address, search terms, time) By Search Engine 6/9/2011 13
   “August, 7, 2006, AOL apologized for releasing search log data on subscribers that had been intended for use with the company's newly launched research site.  Almost 2 weeks before that, AOL had quietly released roughly 20 million search records from 658,000 users on their new AOL Research site. The data includes a number assigned to the anonymous user, the search term, the date and time of the search, and the website visited as a result of the search.” What search engines did? 6/9/2011 14
Web bugs:   	-> A graphic (in a Web site or a graphic-	     enabled email) that can confirm when the message or Web page is viewed and record the IP address of the viewer Third party cookies:  	-> Comes from web page may contain 	      images or advertisements By indirect Marketing 6/9/2011 15
Employers and school officials are increasingly sensitive to the messages you convey in social networks  By Social Networks, Blog & Personal Websites 6/9/2011 16
Want to be a hacker? 6/9/2011 17
By Cybercrime Spywaretakes advantage of security holes by attacking the browser and forcing it to be downloaded and installed and gather your information without your knowledge  Phishingoccurs when a criminal lures the victim into providing financial or personal data Pharmingoccurs when criminals plant programs in the victim’s computer which re-direct the victim from legitimate Web sites to scam look-alike sites 18 6/9/2011
Solutions to Protect Online Privacy  19 6/9/2011
Cookie Controls 20 6/9/2011
Other Technical Resorts Anti-virus software Firewalls Encryption tools 21 6/9/2011
The Platform for Privacy Preferences (P3P) Developed by the World Wide Web Consortium (W3C)  A protocol allowing websites to declare their intended use of information they collect about browsing users and allow users to configure their browsers or other software tools in such a way that they are notified whether web site privacy policies match their pre-set preferences 22 6/9/2011
The Only Two Absolute Choices Avoid yourself from the Internet 1) Raise awareness of privacy 2) Learn to safeguard your privacy with a minimum sacrifice of convenience  23 6/9/2011
THANK YOU!!!!!

More Related Content

What's hot

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
mtvvvv
 
Cyber security
Cyber securityCyber security
Cyber security
Rishav Sadhu
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
Aurora Computer Studies
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
WonderingAriana
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
DINESH KAMBLE
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
Pallavi Agarwal
 
Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
Digital Security
Digital SecurityDigital Security
Digital Security
accenture
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 

What's hot (20)

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Ethics
Cyber EthicsCyber Ethics
Cyber Ethics
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Computer security
Computer securityComputer security
Computer security
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 

Similar to Privacy issues and internet privacy

Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
Asim Sourav Rath
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
Archana Dwivedi
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruizlilyanariz
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
Cybermaterial
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdf
Adzappier
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
prashanth73488
 
General Privacy policy for scorewiki
General Privacy policy for scorewikiGeneral Privacy policy for scorewiki
General Privacy policy for scorewiki
Saurav Roy
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
Aparna Sharma
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
Parallel Wireless, Inc.
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
devashishicai
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
MIsmail73
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
complianceonline123
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
anita gouda
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos Beretas
 
Here comes the Cookie Monster
Here comes the Cookie MonsterHere comes the Cookie Monster
Here comes the Cookie Monster
BANNER
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
Irene Pollak
 
Cyber security
Cyber securityCyber security
Cyber security
Anju Sharma
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerce
Wisnu Dewobroto
 

Similar to Privacy issues and internet privacy (20)

Cyber Safety
Cyber Safety Cyber Safety
Cyber Safety
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
 
How to protect your digital footprint
How to protect your digital footprintHow to protect your digital footprint
How to protect your digital footprint
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
Cookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdfCookie Consent and Authorized Data Collection_Mar23.pdf
Cookie Consent and Authorized Data Collection_Mar23.pdf
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
General Privacy policy for scorewiki
General Privacy policy for scorewikiGeneral Privacy policy for scorewiki
General Privacy policy for scorewiki
 
Is web scraping legal or not?
Is web scraping legal or not?Is web scraping legal or not?
Is web scraping legal or not?
 
Privacy Policy
Privacy PolicyPrivacy Policy
Privacy Policy
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Internet Cookies
Internet CookiesInternet Cookies
Internet Cookies
 
Christos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TEChristos_Beretas_Internet_Privacy_and_Myths_TE
Christos_Beretas_Internet_Privacy_and_Myths_TE
 
Here comes the Cookie Monster
Here comes the Cookie MonsterHere comes the Cookie Monster
Here comes the Cookie Monster
 
Google Policy Primer
Google Policy PrimerGoogle Policy Primer
Google Policy Primer
 
Cyber security
Cyber securityCyber security
Cyber security
 
The regulatory environment of electronic commerce
The regulatory environment of electronic commerceThe regulatory environment of electronic commerce
The regulatory environment of electronic commerce
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Privacy issues and internet privacy

  • 1. Privacy Issues and Internet Privacy By, Vinyas S
  • 2. Information technology -> Collects, stores, integrates and retrieves data and information Store and Retrieve information!!! -> a Negative impact on right to Privacy??? Introduction
  • 3. The ability of an individual or group to secluded themselves or information about themselves and thereby reveal it selectively A personal, subjective condition. One person cannot decide for another what his or her sense of privacy should be Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public What Is Privacy? 6/9/2011 3
  • 4. Violation of Privacy Computer Monitoring Computer Matching Unauthorized Personal Files Eg. for Privacy Issues
  • 5. How our Personal Information Gets Revealed 6/9/2011 5
  • 6.
  • 7. Internet Service Providers (ISP) always know your IP address and the IP address to which you are communicating ISPs are capable of observing unencrypted data passing between you and the Internet, but not properly-encrypted data They are usually prevented to do so due to social pressure and law. By ISP 6/9/2011 7
  • 8. May be inappropriately spread by the original receiver May be intercepted May be legally viewed or disclosed by service providers or authorities By Email 6/9/2011 8
  • 9. Any member of the list or group could collect and distribute your Email address and information you post By Discussion groups 6/9/2011 9
  • 10. Most web browsers can save some forms of personal data, such as browsing history, cookies, web form entries and password You may accidentally reveal such information when using a browser on a public computer or someone else's. By Internet Browsers 6/9/2011 10
  • 11. Cookies are data packets sent by a server to a web client and then sent back unchanged by the client each time it accesses that server Cookies are used for authenticating, session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts Cookies are only data, not programs nor viruses What are cookies? 6/9/2011 11
  • 12. A Sample of Cookie 6/9/2011 12 -->If you type JavaScript:alert(document.cookie)into the address bar, when logged onto a site, it is possible to see the cookies which have been set from that domain.
  • 13. Search engines have and use the ability to track each one of your searches (e.g. ,IP address, search terms, time) By Search Engine 6/9/2011 13
  • 14. “August, 7, 2006, AOL apologized for releasing search log data on subscribers that had been intended for use with the company's newly launched research site. Almost 2 weeks before that, AOL had quietly released roughly 20 million search records from 658,000 users on their new AOL Research site. The data includes a number assigned to the anonymous user, the search term, the date and time of the search, and the website visited as a result of the search.” What search engines did? 6/9/2011 14
  • 15. Web bugs: -> A graphic (in a Web site or a graphic- enabled email) that can confirm when the message or Web page is viewed and record the IP address of the viewer Third party cookies: -> Comes from web page may contain images or advertisements By indirect Marketing 6/9/2011 15
  • 16. Employers and school officials are increasingly sensitive to the messages you convey in social networks  By Social Networks, Blog & Personal Websites 6/9/2011 16
  • 17. Want to be a hacker? 6/9/2011 17
  • 18. By Cybercrime Spywaretakes advantage of security holes by attacking the browser and forcing it to be downloaded and installed and gather your information without your knowledge  Phishingoccurs when a criminal lures the victim into providing financial or personal data Pharmingoccurs when criminals plant programs in the victim’s computer which re-direct the victim from legitimate Web sites to scam look-alike sites 18 6/9/2011
  • 19. Solutions to Protect Online Privacy 19 6/9/2011
  • 20. Cookie Controls 20 6/9/2011
  • 21. Other Technical Resorts Anti-virus software Firewalls Encryption tools 21 6/9/2011
  • 22. The Platform for Privacy Preferences (P3P) Developed by the World Wide Web Consortium (W3C) A protocol allowing websites to declare their intended use of information they collect about browsing users and allow users to configure their browsers or other software tools in such a way that they are notified whether web site privacy policies match their pre-set preferences 22 6/9/2011
  • 23. The Only Two Absolute Choices Avoid yourself from the Internet 1) Raise awareness of privacy 2) Learn to safeguard your privacy with a minimum sacrifice of convenience 23 6/9/2011

Editor's Notes

  1. 1.Accessing individuals’ private e-mail conversations, computer records and sharing this information2. Knowing or tracking where a person is tracking his mobile or paging devices3. Using the customer info from many sources to market additional business services4. Collecting cell no’s, e-mail add, credit no to build fake profiles