SlideShare a Scribd company logo
1 of 26
Hamimah bte Mohd Jamil




MUHAMMAD BIN MOHD SUKERI
(A13CS0068)
NURUL EMIRA BINTI ABDUL AZIZ
(A13CS0128)
WAN HAJARUL ASIKIN BINTI WAN
ZUNAIDI (A13CS0168)
PRIVACY
• Computing technology makes it possible to
collect and use our data.
• The website we visit is one of the way the data
collection.
• Would you matter if your personal
information is been shared ?
PRIMARY
PRIVACY
ISSUES

ACCURACY :Relates to the responsibility of those who collect the data is
correct
PROPERTY :who on data and right to the software
ACCESS :relates to the responsibility of those who have data to control who
is able to use it
LARGE DATABASE
• Large organisation are constantly compiling
information about us.
• There are about 2000 database
• Example : Telephone companies-compile lists of
the call we make.
• REVERSE DIRECTORY
list telephone
number followed by subscriber names.
• *insert picture
• *change title
• Information reseller(information broker) : Collect
and sell personal data. Electronic Profiles : are
compiled from database to provide highly detailed
and personalized descriptions of individual
• Our personal information has been a marketable
commodity. This raises many issues including :
1.COLLECTING PUBLIC,BUT PERSONALLY IDENTIFYING
INFORMATION.

2.SPREADING INFORMATION WITHOUT PERSONAL
CONSENT.

3.SPREADING INACCURATE INFORMATION
IDENTITY THEFT :
• Is the illegal assumption of someone’s
identity for the purpose of economic gain.

MISTAKEN IDENTITY :
• Occurs when an electronic profile of one
person is switched with another.
• INFORMATION OF INFORMATION ACT :
entitles individuals access to
governmental records relating to them.
Many organization monitor employee e-mail and
computer files using software called SNOOPWARE
Many people believe that, while using the web, little
can be done to invade their privacy. This is called the
illusion of anonymity
Record location of visited sites

Two basic type are TRADITIONAL COOKIES AND AD
NETWORK COOKIES(ADWARE COOKIES).
• TRADITIONAL COOKIES-Provide information to a single sites,a
cookies is deposited with the information that identifies specifically
• AD NETWORK(ADWARE COOKIES-Record your activities across
different sites.
• PRIVACY MODE(INPRIVATE BROWSING;PRIVATER BROWSING)eliminate history files and block cookies.
• SPYWARE-Secretly record and report internet activities.
• COMPUTER MONITORING(KEYSTROKE LOGGERS)-watches what
you do.
• WEB BUGS-Provide information back to spammers about activity
on e-mail account.
• ANTISPYWARE(SPY REMOVAL PROGRAM)-detect Web bug and
monitoring software.
GRAMM-LEACH-BLILEY ACT

• Protect personal financial information
HEALTH INSURANCE PROTABILITY AND
ACCOUNTABILITY ACT(HIPAA)

• Protect medical records
FAMILY EDUCATIONAL RIGHTS AND PRIVACY
ACT(FREPA)

• Restricts disclosure of educational records
• Computer criminal included employee , outside
users , hacker and crackers ,carders , organized
crime, and terrorist
• HACKER :Create or improve programs and shared
those program with fellow hackers . Typically are
not criminal.
• CRACKERS :Share programs designed to gain
unauthorized access computer systems or disrupt
networks.Typically are criminals.
• CARDERS :Specialize in stealing,trading and using
stolen credit cards over the internet.
Is an illegal action involving special knowledge
of computer technology
• CYBER-BULLYING : intended to hurt or embarrass
another person.
• ROGUE WI-FI HOTSPOT :Capture personal
information
• SCAMS : designed to trick people into spending
their time/money.
• DENIAL OF SERVICE ATTACK(DOS) : Is attempt to
shut down or stop a computer system/network.it
floods a computer or network with requests for
information and data.
• Theft : Takes many forms including stealing
hardware, software, data and computer time.
• Data manipulation : Involves changing data or
leaving prank messages .The Computer Fraud and
Abuse Act helps protect against data manipulation.
• MALICIOUS PROGRAMS (MALWARE) : Design to damage or
disrupt computer system.3 most common types of malware
are viruses, worms, and Trojan horses.
VIRUSES
• Some of the viruses are harmless while some of it can damaging our system
component.

WORMS
• It fill the computer a computer system with self replicating
information, clogging the system that is operation are slowed/stopped
• Typically find their way into microcomputer through e-mail
attached/programs downloaded from internet
Trojan horses
• Disguised as something else
• Not a viruses , but it carries viruses.
Zombies
• Remotely controlled infected computer for malicious purpose.
• A collection of zombies computer is known as botnet or robot network
NATURAL DISASTER:
• Included fires,flod,wind,hurricans and tornado.Even computer users should store
backup disk of programms and data in safe location.
CIVIL STRIFE AND TERRORISM:
• Wars,riot,and terrorist activities are real risks in all parts of the world.
TECHNOLOGICAL FAILURES:
• Microcomputer should use a surge protector,a divice that separate the computer
from the power source of the wall outlet.This may protect the computer
HUMAN ERRORS:
• Human mistakes are inevitable.Data entry errors are probably the most
commonplace could lead to mistaken identity.
• Occur when office workers save important documents under files names that are
not descriptive and not recognizable by others
RESTRICTING ACCESS :
Sometimes security matter of putting guards on
company computer rooms and checking the
identification of everyone admitted.Other times it use
biometric scanning such as fingerprint and iris.
Password are secret words or phrases that must be
keyed into a computer system to gain access.
E-MAIL ENCRYPTING : Protect e-mails messages as the moves
across the internet.
FILE ENCRYPTING :Protects sensitive files by encrypting them
before they stored on a hard drive.
WEB SITES ENCRYPTING :Secures Web transaction,especially
financial transaction
VIRTUAL PRIVATE NETWORK(VPN) :Encrypt connections
between company networks and remote users such as
workers connecting from home
WIRELESS NETWORK ENCRYPTING :Restricts access to
authorized uses on wireless network.WEA(WIRED
EQUIVALENT PRIVACY) is one of the best-known wireless
encryption protocols.
Ethics ?
 Standards of moral products.
-the right to keep personal information, such as credit
ratings and medical histories, from getting into
unauthorized hands.
2 important issues in computer ethics.
1. Copyright and Digital Right Management

2. Plagiarism
• Gives content creators the right to control the
use and distribution of their work.
Example of materials :
• Paintings , books , music, films , video games.

Others : make unauthorized copies
• Digital media. (violates copyright)
• Is the unauthorized copying and distribution of software.

Digital Millennium Copyright Act
-established the right of the program owner to make a backup
copy and disallow the creation of copies.
-illegal to download copyright-protected music and videos from
Internet.

Digital rights management (DRM)
-collection of technologies designed to prevent copyright
violations.
-control the number of devices that can access given file.
-limits the kinds of devices that can access a file.
• The illegal and unethical representation of
some other person’s work and ideas as your
own without giving credit to the original
source.
• Example :
cutting &
pasting Web content
into a report or paper.
Cryptographers design encryption algorithms,
break codes, and provide support to nasional
security efforts.
 PhD in mathematics and broad experience in
computer science are required.
Salary range is $60.000 to over $100,000.
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation

More Related Content

What's hot

Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and PrivacyVertex Holdings
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 

What's hot (20)

Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
system Security
system Security system Security
system Security
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
Privacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital WorldPrivacy & Data Protection in the Digital World
Privacy & Data Protection in the Digital World
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Similar to Privacy , Security and Ethics Presentation

Similar to Privacy , Security and Ethics Presentation (20)

Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
sc.pptx
sc.pptxsc.pptx
sc.pptx
 
UNIT V.pptx
UNIT V.pptxUNIT V.pptx
UNIT V.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptxCRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
CRYPTOGRAPHY AND NETWORK SECURITY ppt by me.pptx
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
Chap11
Chap11Chap11
Chap11
 
Chap11
Chap11Chap11
Chap11
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
MIS part 4_CH 11.ppt
MIS part 4_CH 11.pptMIS part 4_CH 11.ppt
MIS part 4_CH 11.ppt
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Privacy , Security and Ethics Presentation

  • 1. Hamimah bte Mohd Jamil    MUHAMMAD BIN MOHD SUKERI (A13CS0068) NURUL EMIRA BINTI ABDUL AZIZ (A13CS0128) WAN HAJARUL ASIKIN BINTI WAN ZUNAIDI (A13CS0168)
  • 2.
  • 3. PRIVACY • Computing technology makes it possible to collect and use our data. • The website we visit is one of the way the data collection. • Would you matter if your personal information is been shared ? PRIMARY PRIVACY ISSUES ACCURACY :Relates to the responsibility of those who collect the data is correct PROPERTY :who on data and right to the software ACCESS :relates to the responsibility of those who have data to control who is able to use it
  • 4. LARGE DATABASE • Large organisation are constantly compiling information about us. • There are about 2000 database • Example : Telephone companies-compile lists of the call we make. • REVERSE DIRECTORY list telephone number followed by subscriber names. • *insert picture • *change title
  • 5. • Information reseller(information broker) : Collect and sell personal data. Electronic Profiles : are compiled from database to provide highly detailed and personalized descriptions of individual • Our personal information has been a marketable commodity. This raises many issues including : 1.COLLECTING PUBLIC,BUT PERSONALLY IDENTIFYING INFORMATION. 2.SPREADING INFORMATION WITHOUT PERSONAL CONSENT. 3.SPREADING INACCURATE INFORMATION
  • 6. IDENTITY THEFT : • Is the illegal assumption of someone’s identity for the purpose of economic gain. MISTAKEN IDENTITY : • Occurs when an electronic profile of one person is switched with another. • INFORMATION OF INFORMATION ACT : entitles individuals access to governmental records relating to them.
  • 7. Many organization monitor employee e-mail and computer files using software called SNOOPWARE Many people believe that, while using the web, little can be done to invade their privacy. This is called the illusion of anonymity Record location of visited sites Two basic type are TRADITIONAL COOKIES AND AD NETWORK COOKIES(ADWARE COOKIES).
  • 8. • TRADITIONAL COOKIES-Provide information to a single sites,a cookies is deposited with the information that identifies specifically • AD NETWORK(ADWARE COOKIES-Record your activities across different sites. • PRIVACY MODE(INPRIVATE BROWSING;PRIVATER BROWSING)eliminate history files and block cookies. • SPYWARE-Secretly record and report internet activities. • COMPUTER MONITORING(KEYSTROKE LOGGERS)-watches what you do. • WEB BUGS-Provide information back to spammers about activity on e-mail account. • ANTISPYWARE(SPY REMOVAL PROGRAM)-detect Web bug and monitoring software.
  • 9. GRAMM-LEACH-BLILEY ACT • Protect personal financial information HEALTH INSURANCE PROTABILITY AND ACCOUNTABILITY ACT(HIPAA) • Protect medical records FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT(FREPA) • Restricts disclosure of educational records
  • 10.
  • 11. • Computer criminal included employee , outside users , hacker and crackers ,carders , organized crime, and terrorist • HACKER :Create or improve programs and shared those program with fellow hackers . Typically are not criminal. • CRACKERS :Share programs designed to gain unauthorized access computer systems or disrupt networks.Typically are criminals. • CARDERS :Specialize in stealing,trading and using stolen credit cards over the internet.
  • 12. Is an illegal action involving special knowledge of computer technology • CYBER-BULLYING : intended to hurt or embarrass another person. • ROGUE WI-FI HOTSPOT :Capture personal information • SCAMS : designed to trick people into spending their time/money.
  • 13. • DENIAL OF SERVICE ATTACK(DOS) : Is attempt to shut down or stop a computer system/network.it floods a computer or network with requests for information and data. • Theft : Takes many forms including stealing hardware, software, data and computer time. • Data manipulation : Involves changing data or leaving prank messages .The Computer Fraud and Abuse Act helps protect against data manipulation.
  • 14. • MALICIOUS PROGRAMS (MALWARE) : Design to damage or disrupt computer system.3 most common types of malware are viruses, worms, and Trojan horses. VIRUSES • Some of the viruses are harmless while some of it can damaging our system component. WORMS • It fill the computer a computer system with self replicating information, clogging the system that is operation are slowed/stopped • Typically find their way into microcomputer through e-mail attached/programs downloaded from internet Trojan horses • Disguised as something else • Not a viruses , but it carries viruses. Zombies • Remotely controlled infected computer for malicious purpose. • A collection of zombies computer is known as botnet or robot network
  • 15. NATURAL DISASTER: • Included fires,flod,wind,hurricans and tornado.Even computer users should store backup disk of programms and data in safe location. CIVIL STRIFE AND TERRORISM: • Wars,riot,and terrorist activities are real risks in all parts of the world. TECHNOLOGICAL FAILURES: • Microcomputer should use a surge protector,a divice that separate the computer from the power source of the wall outlet.This may protect the computer HUMAN ERRORS: • Human mistakes are inevitable.Data entry errors are probably the most commonplace could lead to mistaken identity. • Occur when office workers save important documents under files names that are not descriptive and not recognizable by others
  • 16. RESTRICTING ACCESS : Sometimes security matter of putting guards on company computer rooms and checking the identification of everyone admitted.Other times it use biometric scanning such as fingerprint and iris. Password are secret words or phrases that must be keyed into a computer system to gain access.
  • 17. E-MAIL ENCRYPTING : Protect e-mails messages as the moves across the internet. FILE ENCRYPTING :Protects sensitive files by encrypting them before they stored on a hard drive. WEB SITES ENCRYPTING :Secures Web transaction,especially financial transaction VIRTUAL PRIVATE NETWORK(VPN) :Encrypt connections between company networks and remote users such as workers connecting from home WIRELESS NETWORK ENCRYPTING :Restricts access to authorized uses on wireless network.WEA(WIRED EQUIVALENT PRIVACY) is one of the best-known wireless encryption protocols.
  • 18.
  • 19. Ethics ?  Standards of moral products. -the right to keep personal information, such as credit ratings and medical histories, from getting into unauthorized hands.
  • 20. 2 important issues in computer ethics. 1. Copyright and Digital Right Management 2. Plagiarism
  • 21. • Gives content creators the right to control the use and distribution of their work. Example of materials : • Paintings , books , music, films , video games. Others : make unauthorized copies • Digital media. (violates copyright)
  • 22. • Is the unauthorized copying and distribution of software. Digital Millennium Copyright Act -established the right of the program owner to make a backup copy and disallow the creation of copies. -illegal to download copyright-protected music and videos from Internet. Digital rights management (DRM) -collection of technologies designed to prevent copyright violations. -control the number of devices that can access given file. -limits the kinds of devices that can access a file.
  • 23. • The illegal and unethical representation of some other person’s work and ideas as your own without giving credit to the original source. • Example : cutting & pasting Web content into a report or paper.
  • 24. Cryptographers design encryption algorithms, break codes, and provide support to nasional security efforts.  PhD in mathematics and broad experience in computer science are required. Salary range is $60.000 to over $100,000.