1 / 18

Personal Privacy and Security

Personal Privacy and Security. Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University. Introduction. Internet: Good or Bad? Privacy/Security Issues Victims? What victims? Scams: How hard are they to spot? Scams: FBI/NW3C. Which ones have you heard of?

kedem
Télécharger la présentation

Personal Privacy and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski, May 2012

  2. Introduction • Internet: Good or Bad? • Privacy/Security Issues • Victims? What victims? • Scams: How hard are they to spot? • Scams: FBI/NW3C. Which ones have you heard of? • Privacy Threats • Tips to protect yourself • Security Threats • Tips to protect your computer Personal Privacy & Security - Z. Bahorski, May 2012

  3. Internet: Good or Bad? • “Good” uses of the Internet • “Bad” uses of the Internet Personal Privacy & Security - Z. Bahorski, May 2012

  4. Where the hackers are from! Trustwave Global Security Report 2012.pdf Personal Privacy & Security - Z. Bahorski, May 2012

  5. Internet: Good or Bad? Should we keep it anyway? Quote: http://www.coursesmart.com/9780136008859/chap01# Personal Privacy & Security - Z. Bahorski, May 2012

  6. Privacy/Security Issues: • What’s in a name? • Names with Positive connotations • Names with Negative connotations Personal Privacy & Security - Z. Bahorski, May 2012

  7. Privacy/Security Issues: • How can people find information about us? Personal Privacy & Security - Z. Bahorski, May 2012

  8. Privacy/Security Issues: • Can we really remain anonymous when we use the Web? • How much can a web site tell about you and your computer just by you connecting to their web site? • Go to: http://cyscape.com/showbrow.asp?bhcp=1 • To whom is it advantageous to gather information about you? • Go to: http://www.spokeo.com Personal Privacy & Security - Z. Bahorski, May 2012

  9. Privacy/Security Issues: • Computers NEVER forget! • Sign in to Google or Gmail • In location box, type in: • http://www.google.com/history • Why DOES Google keep track of • Key words in Gmail • Search phrases Personal Privacy & Security - Z. Bahorski, May 2012

  10. Victims? What victims? • According to the United States Census: • there are now 313,310,928 million people in the United States with over 7 billion in the world (USCB, 2012). • The Federal Trade Commission (FTC) estimates that, “as many as 9 million Americans have their identities stolen each year” (FTC, n.d.). • That is almost 3 percent of the American population! Personal Privacy & Security - Z. Bahorski, May 2012

  11. Victims? What victims? • Identity theft • Using another person’s name, personal identification (driver’s license number, social security number), credit card, or banking information for personal gain • Taking advantage of credit history to:* • Buy a car (turn around quickly at an auction house) • Buy a house • Taking advantage of credit card or banking info: • Get cash • Open and pay for a cell phone account • Buy goods or services • Get government documents – for their new identity! Personal Privacy & Security - Z. Bahorski, May 2012

  12. Victims? What victims? Identity theft – What to do if you are a victim: • Keep a DETAILED log including dates, times, names and numbers called. Do these 4 things: • Call or go online and place a fraud alert: • TransUnion: 1-800-680-7289; www.transunion.com; • Equifax: 1-800-525-6285; www.equifax.com; • Experian: 1-888-EXPERIAN (397-3742); www.experian.com; • Close the accounts that have been compromised. • File a complaint with the FTC to help police track like-thefts. • File a police report (give them a copy of your FTC complaint to add to the police report). From the FTC at: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html Personal Privacy & Security - Z. Bahorski, May 2012

  13. Privacy Threats • Surveillance: • Cameras • Look up! Cameras are “everywhere” (public places and in private places where posted) Look for these! You’ll be amazed! • Case: Don’t take pictures in private places • Cookies • For an explanation of cookies, go to: • http://www.cookiecentral.com/n_cookie_faq.htm#what_are • Spying on Cell Phones: go to http://www.mobilespytool.com/ Personal Privacy & Security - Z. Bahorski, May 2012

  14. Privacy Threats • Surveillance cont… • Keyloggers • Record keys pressed on keyboard: Hardware or Software (easy to do, directions are available on the Internet!) • How to Add a keylogger: http://www.youtube.com/watch?v=0X9kNpOJiNQ • Is “FREE” Internet really “free”? • Be careful of fake wi-fi • Just how much surveillance is allowed in the workplace? • Go to: http://www.youtube.com/watch?v=lO3wuYiITiE Personal Privacy & Security - Z. Bahorski, May 2012

  15. Tips to Protect Yourself! • Protecting yourself online: • Go to: Youtube.com video: Online Security Tips and Most Used Passwords To Avoid • http://www.youtube.com/watch?v=EVODZBOFftI&feature=relmfu • 5 tips to help protect yourself online: (This list is from the PrivacyNowTV video) 1. Don’t use a single password 2. Never access online accounts through an email link 3. Never click on popup ads 4. Macs are vulnerable to phishing scams 5. Use a dedicated credit card for online purchases Personal Privacy & Security - Z. Bahorski, May 2012

  16. Tips to Protect Yourself! • Protecting yourself online: • (my 6th): Do not reply to an email to “unsubscribe”! • (my 7th): NEVER post anything online that you don’t want posted on a billboard on I-94! • Includes: Personal information, pictures, poetry, reports (papers), etc. • Facebook (and their “partners”) can USE any picture that you post for any reason. • ANY employer (current or future) can view anything you post onto Facebook. (Don’t think that only your friends can see your stuff.) They can pay for this. • (my 8th): Don’t use information (such as pet names) as passwords if you include that info online. Personal Privacy & Security - Z. Bahorski, May 2012

  17. Tips to Protect Your Computer! • Protecting your computer: • Tips to help you protect your computer from viruses and spyware: • Keep your Operating System updated (don’t ignore updates!) • Install a firewall • Install antivirus software (2 if you can) • Do not open attachments from unknown sources • Do not run programs that you’ve downloaded from online unless you check it for viruses first! • Do not download from unknown sites. • Do not click on ads • DO surf wisely! Is the site REALLY worth the RISK? Personal Privacy & Security - Z. Bahorski, May 2012

  18. Contact Information • Zenia C. Bahorski Ph.D. • 511 Pray-Harrold Hall • Department of Computer Science • Eastern Michigan University • Email: zbahorski@emich.edu • Web page: people.emich.edu/zbahorski • Images: Microsoft Clipart Personal Privacy & Security - Z. Bahorski, May 2012

More Related