Six Myths about Ontologies: The Basics of Formal Ontology
INTERNET PRIVACY
1.
2. INTRODUCTION
As people use computers for a variety
of purposes, confidential
information, confidential
communications, and personal
choices can be registered in a variety
of ways.
Internet privacy is a broad term
referring to the various
concerns, technologies, and strategies
for protecting
information, communications, and
choices that are meant to be private.
3. If you choose to shop online, use
social networking sites, play online
games, or participate in
forums, Internet privacy can become
an issue in a number of ways.
If your passwords are exposed, your
identity can be fraudulently used or
even stolen.
If your contact information is passed
around, you may be subject to spam.
4. If your browsing history becomes
public, people will know what you’ve
been looking at online.
Fortunately, taking certain precautions
can reduce the privacy risks that you
face.
5. Strong passwords that are kept secret
are one way to safeguard
your Internet privacy.
The strongest passwords have certain
characteristics: they have no personal
information, they don’t use real
words, they combine upper and
lowercase characters with numbers, and
they are at least eight characters long.
It is important to note, however, that the
strongest password does no good if
someone else can access it.
6. Browser privacy settings, which
control elements like storage of your
browsing and download history and
the acceptance of cookies, are there
for you to alter to meet your
preferences
Similarly, social networking sites have
settings to allow you to control the
level of privacy of various postings you
may make.
7. Note that the default settings may be
skewed towards the public exposure
of information rather than towards
Internet privacy.
Facebook has been criticized on this
point.
8. For some sites , make sure you read
the privacy terms before signing up. In
that, your main choice usually is to
become a participant, often with
an email address attached to your
user name, which may or may not be
your real name.
As an alternative, you may be able to
take advantage of guest privileges, if
they are offered, or be limited to
reading, but not posting.
9. Accidental violation
of Internet privacy can also occur.
This would be the case if somebody
accidentally or unthinkingly forwarded an
email to multiple parties that was only
meant for one person, or neglected to
omit a personal comment from the
sender before resending.
Though this can best be avoided by
rigorously separating work and personal
emails, this is not always a practical
solution. Careful attention and discretion
are the only real safeguards.
10. Internet privacy: why it is
important
Teens and young adults are the most
creative users.
Personal information :
Name, Address, etc…
Technology increases risk.
28th jan 2008 celebrates Data privacy
day.
11. Privacy : what is it ?
Privacy is the right or oppurtunity to
decide who has to access to your
personal information.
12. You can’t get something for
nothing
The cost of social networking
You may participate in all social
networking in free but …..
You have to provide personal
information.
13. Profits from info.
Website operaters
Companies want to sell you things
Mobile companies
14. Ways to protect your privacy
Use of age and identity verification.
Use services that allow you to report
inappropriate content.
15. Adjust privacy settings
Adjust your privacy settings.
Use of https.
Double security standards.
Use of strong passwords.
18. solutions…..
cookie control
anti virus software
firewalls
encryption tools
19. Two absolute choices
Raise awareness of privacy
Learn to safeguard your privacy with
minimum sacrifice of your convinence
20. Security for privacy
Internet security is a branch of
internet privacy specifically related to
the Internet often involving browser
security
The Internet represents an insecure
channel for exchanging information
leading to a high risk of intrusion or
fraud, such as phishing.
21. Types of Internet security
Network layer security
Ipsec protocol
Biometric security
22. Network layer security
IP can be made secure with the help
of cryptographic methods and
protocols that have been developed
for securing communications on the
Internet.
23. Ipsec protocol
This protocol is designed to protect
communication in a secure manner
using IP.
It is a set of security extensions
developed by IETF, and it provides
security and authentication at the IP
layer by using cryptography.
24. To protect the content, the data is
transformed using encryption
techniques.
There are two main types of
transformation that form the basis of
IPsec:
the Authentication Header (AH) and
Encapsulating Security Payload
(ESP).
25. Biometric security
Biometrics (or biometric
authentication) refers to the
identification of humans by their
characteristics or traits.
Computer science, biometrics to be
specific, is used as a form of
identification and access control.
26. Forms or types…
Palm check
Retina check
Heartbeat and pulse rate
Finger tips check
Voice commands
Imagination (under construction)
27. conclusions….
Internet privacy can be provided upto
a limit.
Awareness should be increased.
Privacy tips should be adopted by net
users.
latest technology enhances security
like cloud computing.