19
1 Arab Academy for Science &Technology & Maritime Transport College of Computing and Information Technology

Lect 08 computer security and privacy 2 4 q

Embed Size (px)

Citation preview

Page 1: Lect 08 computer security and privacy 2 4 q

1

Arab Academy for Science &Technology & Maritime Transport

College of Computing and Information Technology

Page 2: Lect 08 computer security and privacy 2 4 q

2

• Marke&ng  database:  Collec&on  of  data  about  people,  used  for  marke&ng  purposes  • Data  obtained  through  online  and  offline  purchases,  public  informa&on,  etc.  

• Beginning  to  be  used  in  conjunc&on  with  Web  ac&vi&es  • Government  database:  Collec&on  of  data  about  people,  collected  and  maintained  by  the  government  • Tax  informa&on,  Social  Security  earnings,  personal  health  records,  marriage  and  divorce  informa&on  

• Some  informa&on  is  confiden&al,  other  is  public  

Page 3: Lect 08 computer security and privacy 2 4 q

3

• Electronic  profiling  • Using  electronic  means  to  collect  a  variety  of  in-­‐depth  informa&on  about  an  individual  

Page 4: Lect 08 computer security and privacy 2 4 q

4

Page 5: Lect 08 computer security and privacy 2 4 q

5

Page 6: Lect 08 computer security and privacy 2 4 q

6

• Safeguard  your  e-­‐mail  address  

• Use  a  throw-­‐away  e-­‐mail  address  (an  extra  e-­‐mail  address  that  you  can  use  for    ac&vi&es                                                                                          that  might  result  in    spam)  • Get  a  second  e-­‐mail  address                                                                                              from  your  ISP  or  from  Hotmail,                                                                                                Yahoo!  Mail,  or  Gmail  

• Can  stop  using  it    and  get  a  new  one    when  needed  

Page 7: Lect 08 computer security and privacy 2 4 q

7

• Be  cau&ous  of  revealing  personal    informa&on  • Read  a  Web  site’s  privacy  policy  

• Can  use  privacy  soSware,  such  as  the  free  Privacy  Bird  program  

• Do  not  supply  personal  informa&on  to  people  in  chat  rooms    

Page 8: Lect 08 computer security and privacy 2 4 q

8

Page 9: Lect 08 computer security and privacy 2 4 q

9

An  anonymizer  or  an  anonymous  proxy  is  a  tool  that  aUempts  to  make  ac&vity  on  the  untraceable.    It  is  a  proxy  server  computer  that  acts  as  an  intermediary  and  privacy  shield  between  a  client  computer  and  the  rest  of  the  Internet.    It  accesses  the  Internet  on  the  user's  behalf,  protec&ng  personal  informa&on  by  hiding  the  client  computer's  iden&fying  informa&on    

Page 10: Lect 08 computer security and privacy 2 4 q

10

• Be  cau&ous  of  revealing  personal    informa&on  • Read  a  Web  site’s  privacy  policy  

• Avoid  puWng  too  many  personal  details  on  your  Web  site  

• Be  wary  of  sites  offering  prizes  in  exchange  for  personal  informa&on  

• Consider  using  privacy  soSware,  such  as  anonymous  surfing  

• Supply  only  the  required  informa&on  in  registra&on  forms  

• Delete  your  browsing  history  and  e-­‐mail  seWngs  when  using  a  public  computer  

Page 11: Lect 08 computer security and privacy 2 4 q

11

• Use  an  e-­‐mail  filter  to  automa&cally  route  possible  spam  into  a  special  folder  to  deal  with  later  

Page 12: Lect 08 computer security and privacy 2 4 q

12

• Web  servers  holding  sensi&ve  data  should  be  secured  

• Only  enter  personal  informa&on  on  Web  sites  using  secure  servers    

• Automa&c  encryp&on  systems  for  e-­‐mail  can  help  sensi&ve  data  from  accidentally  being  revealed  

Page 13: Lect 08 computer security and privacy 2 4 q

13

• Properly  dispose  of  hardware  and  outdated  data  • Wipe  (not  just  delete)  data  on  hard  drives  before    disposing  of  a  computer  or  hard  drive  

• Storage  media  containing  sensi&ve  data  should  be  shredded  

• Businesses  should  have  a  media  sanita&on/data  destruc&on  policy  

Page 14: Lect 08 computer security and privacy 2 4 q

14

Page 15: Lect 08 computer security and privacy 2 4 q

15

Page 16: Lect 08 computer security and privacy 2 4 q

16

Page 17: Lect 08 computer security and privacy 2 4 q

17

Page 18: Lect 08 computer security and privacy 2 4 q

18

Page 19: Lect 08 computer security and privacy 2 4 q

19

• Difficult  for  legal  system  to  keep  pace  with  technology  

• Difficult  to  balance  freedom  of  speech  with  privacy