SlideShare ist ein Scribd-Unternehmen logo
1 von 28
INTRODUCTION
 As people use computers for a variety
 of purposes, confidential
 information, confidential
 communications, and personal
 choices can be registered in a variety
 of ways.
 Internet privacy is a broad term
 referring to the various
 concerns, technologies, and strategies
 for protecting
 information, communications, and
 choices that are meant to be private.
   If you choose to shop online, use
    social networking sites, play online
    games, or participate in
    forums, Internet privacy can become
    an issue in a number of ways.

   If your passwords are exposed, your
    identity can be fraudulently used or
    even stolen.

   If your contact information is passed
    around, you may be subject to spam.
   If your browsing history becomes
    public, people will know what you’ve
    been looking at online.

   Fortunately, taking certain precautions
    can reduce the privacy risks that you
    face.
   Strong passwords that are kept secret
    are one way to safeguard
    your Internet privacy.

   The strongest passwords have certain
    characteristics: they have no personal
    information, they don’t use real
    words, they combine upper and
    lowercase characters with numbers, and
    they are at least eight characters long.

   It is important to note, however, that the
    strongest password does no good if
    someone else can access it.
    Browser privacy settings, which
    control elements like storage of your
    browsing and download history and
    the acceptance of cookies, are there
    for you to alter to meet your
    preferences

   Similarly, social networking sites have
    settings to allow you to control the
    level of privacy of various postings you
    may make.
 Note that the default settings may be
  skewed towards the public exposure
  of information rather than towards
  Internet privacy.
 Facebook has been criticized on this
  point.
 For some sites , make sure you read
  the privacy terms before signing up. In
  that, your main choice usually is to
  become a participant, often with
  an email address attached to your
  user name, which may or may not be
  your real name.
 As an alternative, you may be able to
  take advantage of guest privileges, if
  they are offered, or be limited to
  reading, but not posting.
   Accidental violation
    of Internet privacy can also occur.

   This would be the case if somebody
    accidentally or unthinkingly forwarded an
    email to multiple parties that was only
    meant for one person, or neglected to
    omit a personal comment from the
    sender before resending.

   Though this can best be avoided by
    rigorously separating work and personal
    emails, this is not always a practical
    solution. Careful attention and discretion
    are the only real safeguards.
Internet privacy: why it is
important
  Teens and young adults are the most
  creative users.
 Personal information :
        Name, Address, etc…
 Technology increases risk.


   28th jan 2008 celebrates Data privacy
    day.
Privacy : what is it ?
   Privacy is the right or oppurtunity to
    decide who has to access to your
    personal information.
You can’t get something for
nothing
   The cost of social networking

   You may participate in all social
    networking in free but …..

    You have to provide personal
    information.
Profits from info.
   Website operaters

   Companies want to sell you things

   Mobile companies
Ways to protect your privacy
   Use of age and identity verification.

    Use services that allow you to report
    inappropriate content.
Adjust privacy settings
   Adjust your privacy settings.

   Use of https.

   Double security standards.

   Use of strong passwords.
Privacy policy should provide
   Notice

   Choice

   Access

   Security
Security risks
   Passwords

   File sharing

   Spyware

   Phishing

   Updating
solutions…..
   cookie control

   anti virus software

   firewalls

   encryption tools
Two absolute choices
   Raise awareness of privacy

   Learn to safeguard your privacy with
    minimum sacrifice of your convinence
Security for privacy

   Internet security is a branch of
    internet privacy specifically related to
    the Internet often involving browser
    security

   The Internet represents an insecure
    channel for exchanging information
    leading to a high risk of intrusion or
    fraud, such as phishing.
Types of Internet security
   Network layer security

   Ipsec protocol

   Biometric security
Network layer security

   IP can be made secure with the help
    of cryptographic methods and
    protocols that have been developed
    for securing communications on the
    Internet.
Ipsec protocol
  This protocol is designed to protect
  communication in a secure manner
  using IP.
 It is a set of security extensions
  developed by IETF, and it provides
  security and authentication at the IP
  layer by using cryptography.
   To protect the content, the data is
    transformed using encryption
    techniques.

 There are two main types of
  transformation that form the basis of
  IPsec:
 the Authentication Header (AH) and
  Encapsulating Security Payload
  (ESP).
Biometric security
  Biometrics (or biometric
  authentication) refers to the
  identification of humans by their
  characteristics or traits.
 Computer science, biometrics to be
  specific, is used as a form of
  identification and access control.
Forms or types…
   Palm check
   Retina check
   Heartbeat and pulse rate
   Finger tips check
   Voice commands
   Imagination (under construction)
conclusions….
   Internet privacy can be provided upto
    a limit.

   Awareness should be increased.

 Privacy tips should be adopted by net
 users.
 latest technology enhances security
 like cloud computing.
INTERNET PRIVACY

Weitere ähnliche Inhalte

Was ist angesagt?

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionHannah323676
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9NehaRohtagi1
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and SecurityAlex Hyer
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & CybersecurityRitamaJana
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityShitiz Upreti
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 

Was ist angesagt? (20)

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
GuardianGabriel
GuardianGabrielGuardianGabriel
GuardianGabriel
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 

Ähnlich wie INTERNET PRIVACY

Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfJihithaJP
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxAsmajaved42
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 

Ähnlich wie INTERNET PRIVACY (20)

Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Fp611 kuliah 2
Fp611 kuliah 2Fp611 kuliah 2
Fp611 kuliah 2
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
techalpha07
techalpha07techalpha07
techalpha07
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptx
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

INTERNET PRIVACY

  • 1.
  • 2. INTRODUCTION  As people use computers for a variety of purposes, confidential information, confidential communications, and personal choices can be registered in a variety of ways.  Internet privacy is a broad term referring to the various concerns, technologies, and strategies for protecting information, communications, and choices that are meant to be private.
  • 3. If you choose to shop online, use social networking sites, play online games, or participate in forums, Internet privacy can become an issue in a number of ways.  If your passwords are exposed, your identity can be fraudulently used or even stolen.  If your contact information is passed around, you may be subject to spam.
  • 4. If your browsing history becomes public, people will know what you’ve been looking at online.  Fortunately, taking certain precautions can reduce the privacy risks that you face.
  • 5. Strong passwords that are kept secret are one way to safeguard your Internet privacy.  The strongest passwords have certain characteristics: they have no personal information, they don’t use real words, they combine upper and lowercase characters with numbers, and they are at least eight characters long.  It is important to note, however, that the strongest password does no good if someone else can access it.
  • 6. Browser privacy settings, which control elements like storage of your browsing and download history and the acceptance of cookies, are there for you to alter to meet your preferences  Similarly, social networking sites have settings to allow you to control the level of privacy of various postings you may make.
  • 7.  Note that the default settings may be skewed towards the public exposure of information rather than towards Internet privacy.  Facebook has been criticized on this point.
  • 8.  For some sites , make sure you read the privacy terms before signing up. In that, your main choice usually is to become a participant, often with an email address attached to your user name, which may or may not be your real name.  As an alternative, you may be able to take advantage of guest privileges, if they are offered, or be limited to reading, but not posting.
  • 9. Accidental violation of Internet privacy can also occur.  This would be the case if somebody accidentally or unthinkingly forwarded an email to multiple parties that was only meant for one person, or neglected to omit a personal comment from the sender before resending.  Though this can best be avoided by rigorously separating work and personal emails, this is not always a practical solution. Careful attention and discretion are the only real safeguards.
  • 10. Internet privacy: why it is important  Teens and young adults are the most creative users.  Personal information : Name, Address, etc…  Technology increases risk.  28th jan 2008 celebrates Data privacy day.
  • 11. Privacy : what is it ?  Privacy is the right or oppurtunity to decide who has to access to your personal information.
  • 12. You can’t get something for nothing  The cost of social networking  You may participate in all social networking in free but …..  You have to provide personal information.
  • 13. Profits from info.  Website operaters  Companies want to sell you things  Mobile companies
  • 14. Ways to protect your privacy  Use of age and identity verification.  Use services that allow you to report inappropriate content.
  • 15. Adjust privacy settings  Adjust your privacy settings.  Use of https.  Double security standards.  Use of strong passwords.
  • 16. Privacy policy should provide  Notice  Choice  Access  Security
  • 17. Security risks  Passwords  File sharing  Spyware  Phishing  Updating
  • 18. solutions…..  cookie control  anti virus software  firewalls  encryption tools
  • 19. Two absolute choices  Raise awareness of privacy  Learn to safeguard your privacy with minimum sacrifice of your convinence
  • 20. Security for privacy  Internet security is a branch of internet privacy specifically related to the Internet often involving browser security  The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.
  • 21. Types of Internet security  Network layer security  Ipsec protocol  Biometric security
  • 22. Network layer security  IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet.
  • 23. Ipsec protocol  This protocol is designed to protect communication in a secure manner using IP.  It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography.
  • 24. To protect the content, the data is transformed using encryption techniques.  There are two main types of transformation that form the basis of IPsec:  the Authentication Header (AH) and Encapsulating Security Payload (ESP).
  • 25. Biometric security  Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits.  Computer science, biometrics to be specific, is used as a form of identification and access control.
  • 26. Forms or types…  Palm check  Retina check  Heartbeat and pulse rate  Finger tips check  Voice commands  Imagination (under construction)
  • 27. conclusions….  Internet privacy can be provided upto a limit.  Awareness should be increased.  Privacy tips should be adopted by net users.  latest technology enhances security like cloud computing.