1 / 18

Privacy

Privacy. How It Applies In A Virtual World. Introduction. Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information is on the world wide web The Pros and Cons User personalization versus user violation How can it be violated?

aderes
Télécharger la présentation

Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy How It Applies In A Virtual World

  2. Introduction • Got cookies? • Internet explorer • What is internet Privacy? • How secure your computer, files, and information is on the world wide web • The Pros and Cons • User personalization versus user violation • How can it be violated? • Through media (google street view), phishing, cookies • Taking Precautions

  3. Spyware • Definition-Malware that can collect information about computer users without their knowledge. It can often hinder a computer’s performance. • Many anti-virus programs now have anti-spyware features.

  4. How does it occur? • People can install them without meaning to as spyware is often installed with other programs. • There are two ways of doing this: • Piggybacking on a desirable piece of software • Trojan horse method i.e tricking the user into downloading it. • Can infect through security holes in internet

  5. Effects of Spyware • Can hinder a computer’s functionality • System becomes slow • Can disable firewall and ant-virus programs

  6. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.

  7. What is Phishing? When Did it Start? • The term originated in the mid 1990s in connection with AOL • Phishing is usually done through fake emails or through instant messaging. • The user is prompted to provide important information about bank accounts or credit card numbers through emails and sites that look legitimate, but are actually fake. Their information can then be used to commit identity theft.

  8. Is It Illegal? • It is illegal to commit Identity theft. • It is not illegal to ask the user to volunteer their personal information. • It is not illegal to send you an important looking message in order to prompt the user into volunteering the desiredinformation. • Therefore phishing is only illegal once the information is used to commit identity theft.

  9. How Does This Affect The Common User?How can you spot a phishing scam? • Anyone can fall victim to phishing, so every internet user must use caution when volunteering private information. • Make sure that your connection is secure. • Signs that an email or site is not authentic: • Misspelled domain names (ex. www.yohoo.com) • It has variations of domains as well (ex. www.yahoo-security.net) • Don’t trust an email that leads you to a website that only shows an IP address (IP address ex. 102.199.60.250.)

  10. What are cookies? Cookies are text files stored on one’s computer after visiting a website Used for: -Storing information such as a unique visitor ID -Allowing customization of a webpage, such that it can save information for the computer the person is currently using.

  11. Problems with Cookies The information from cookies can be accessed by the website, which can then sell your information to others, allowing for ‘targeted’ ads Based on the ‘profile’ built up by visiting certain websites or by one’s search history, ads will attempt to be tailored to one’s perceived interests

  12. Verdict Cookies are, for the most part, harmless Delete your cookies once in a while – some have expiration dates years in the future, and may persist indefinitely In addition, there exist many different pieces of software for those who might want to manage their cookies and maintain their privacy

  13. 360 degree views from visual perspectives of the street Online access to ANYONE! What is this?

  14. Gives real pictures of places. Where you live Where you work Schools Public security Why it violates one’s privacy?

  15. Nothing really…. Sorry Attempt to sue? (has happened, didn’t work) What can one do?

  16. What does this all mean? • There are many ways for people to invade privacy through computers not just limited to spyware, phishing, cookies, and Google street view. • In this computer filled world, people continuously find ways to get access to private information. • While some of these activities are illegal, not everyone is caught. It is important for people to be aware of strategies used to collect personal information.

  17. It is important for people to take precautions so their private information is protected. No one wants their passwords or credit card numbers stolen. • Only give sensitive information to authenticated and secure websites. Always validate websites or emails. • Run anti-virus/anti-spyware programs to ensure that your information is not being collected. • Just in case, you can delete cookies. • Make sure that your internet connection is secure and install a firewall. • Keep up to date on computer news and how to protect yourself.

More Related