SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Information
Privacy and
Security
Presented By: Anu Mary Sunny (6030063)
Information
Privacy
• Legal or moral right
• The ability to control information
about oneself
• Ability to express selectively
• Privacy in IT also known as Data
Privacy
Information Types
TELEVISION EDUCATIONAL FINANCIAL INTERNET LOCATIONAL
MEDICAL POLITICAL
Laws and Authorities
• Each country has its own
privacy protection policies
Example: Office of the Australian
Information Commissioner(OAIC)
Privacy
Protocols
and
Algorithms
Fair Information Practices: A standard for
collecting and using personal data
The Platform for Privacy Preferences: it is a
protocol for websites
Anti-Tracking Source Location Privacy Protection
Protocol: Protection of data in sensor networks
ID3 Decision Tree: Based on Interference which
adds ransom value to actual data
Privacy
Protocols,
Technologies
and
Algorithms
(Contd..)
Distributed Data Mining: An
algorithm based on secure
multi-party computation
Privacy Enhancing Technologies:
Methods of data protection in
accordance with law
Information
Security
Methods used for the
protection of data
Principles are:
Confidentiality, Integrity
and Availability
Threats on digital information
Viruses Worms Phishing attacks Trojan horses Theft of intellectual
property
Identity theft
Sabotage Ransomware
Security
Enforcement
Access Control:Identification, Authorization, Authentication
Application Security: Antivirus,Secure Coding,
Encryption
Firewall
Intrusion detection System
Run Time Application Self Protection
Mobile Secure Gateway
Relation Between Privacy and Security
PRIVACY IS ABOUT SAFEGUARDING THE USER
WHEREAS SECURITY IS ABOUT PROTECTION
OF DATA
PRIVACY CANNOT EXIST WITHOUT SECURITY
WHEREAS SECURITY CAN EXIST WITHOUT
PRIVACY.
Concerns
Health care: protection of patient
records
Sensor Networks: Protection of huge
amount of data generated by sensors
Online Business: Protection of
consumer records and bank details
Social Media: Protection of personal
details and chat history of users
Conclusion
• The term Information privacy and security are
closely related, where privacy cannot exist
without security whereas security can exist
without privacy.
• The threats of information can be from hackers,
vulnerabilities in software, lack of transparency
in privacy policies, collection of unnecessary
data, personal data sharing, data transfer over
insecure channels etc.
• https://www.youtube.com/watch?v=6vNxslcf9A
E
References
Anthony D, M, Ana Fernandez 2001, ‘Consumer Perceptions of Privacy and Security Risks
for Online Shopping’, vol. 35, no. 1, pp. 27-44.
Dimitrova, A & Brkan, M 2018, ‘Balancing National Security and Data Protection: The
Role of EU and US Policy-Makers and Courts before and after the NSA Affair’, JCMS:
Journal of Common Market Studies, vol. 56, no. 4, pp. 751-67.
France Belanger & crossler, RE 2011, ‘Privacy in the Digital Age: A Review of Information
Privacy Research in InformationSystems’, MIS Quarterly, vol. 35, no. 4, pp. 1017-41.
Kagal L, FT, Joshi A, Greenspan S. 2006, ‘Security and Privacy Challenges in Open and
Dynamic Environments’, Computer, vol. 39, no. 6, pp. 89-91.
Li, C & Liu, H-w 2015, ‘A Review of Privacy Protection in E-commerce’, Journal of
Advanced Management Science, pp. 50-3.
Marci Meingast, TRSS 2006, ‘Security and Privacy Issues with Health Care Information
Technology’, in International Conference of the IEEE Engineering in Medicine and Biology
Society, New York, NY, USA.
Meng, X 2008, ‘Analyze and Prevent the Security Risks of E-Commerce Privacy’, paper
presented to 2008 International Conference on Management of e-Commerce and e-
Government.
References
Santosh Krishna Putchala, KB, R Anitha 2013, ‘Information
security challenges in social media interactions: strategies
to normalize practices across physical and virtual worlds’,
paper presented to DSCI - Best Practices Meet, Chennai,
India, 12-12 July 2013.
Weber, RH 2010, ‘Internet of Things – New security and
privacy challenges’, Computer Law & Security Review, vol.
26, no. 1, pp. 23-30.
Xin He, WPT 2017, ‘Multilayer Sensor Network for
Information Privacy’, in IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), New
Orleans, LA, USA.

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
Hajarul Cikyen
 

Was ist angesagt? (20)

Data Protection and Privacy
Data Protection and PrivacyData Protection and Privacy
Data Protection and Privacy
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
Data protection
Data protectionData protection
Data protection
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
What is Differential Privacy?
What is Differential Privacy?What is Differential Privacy?
What is Differential Privacy?
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
Privacy in simple
Privacy in simplePrivacy in simple
Privacy in simple
 
Data protection
Data protectionData protection
Data protection
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Data Protection Presentation
Data Protection PresentationData Protection Presentation
Data Protection Presentation
 
Personal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochurePersonal Data Protection Singapore - Pdpc corporate-brochure
Personal Data Protection Singapore - Pdpc corporate-brochure
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
GDPR
GDPRGDPR
GDPR
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Data Security
Data SecurityData Security
Data Security
 
Sensitive data
Sensitive dataSensitive data
Sensitive data
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cryptography
CryptographyCryptography
Cryptography
 

Ähnlich wie Information privacy and Security

Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard
 
hel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppthel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppt
gealehegn
 
Examining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toExamining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related to
Ali Zeinoddini Meymand
 
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
Raúl van Riezen
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
adnis1
 
Security of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxSecurity of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docx
kaylee7wsfdubill
 

Ähnlich wie Information privacy and Security (20)

Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
hel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppthel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppt
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital Health
 
Examining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toExamining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related to
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
Information policy ppt
Information policy pptInformation policy ppt
Information policy ppt
 
DATA & PRIVACY PROTECTION Anna Monreale Università di Pisa
DATA & PRIVACY PROTECTION Anna Monreale Università di PisaDATA & PRIVACY PROTECTION Anna Monreale Università di Pisa
DATA & PRIVACY PROTECTION Anna Monreale Università di Pisa
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
 
Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...
 
Privacy and Surveillance
Privacy and SurveillancePrivacy and Surveillance
Privacy and Surveillance
 
Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...
 
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
Security of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxSecurity of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docx
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 

Kürzlich hochgeladen

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 

Kürzlich hochgeladen (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

Information privacy and Security

  • 2. Information Privacy • Legal or moral right • The ability to control information about oneself • Ability to express selectively • Privacy in IT also known as Data Privacy
  • 3. Information Types TELEVISION EDUCATIONAL FINANCIAL INTERNET LOCATIONAL MEDICAL POLITICAL
  • 4. Laws and Authorities • Each country has its own privacy protection policies Example: Office of the Australian Information Commissioner(OAIC)
  • 5. Privacy Protocols and Algorithms Fair Information Practices: A standard for collecting and using personal data The Platform for Privacy Preferences: it is a protocol for websites Anti-Tracking Source Location Privacy Protection Protocol: Protection of data in sensor networks ID3 Decision Tree: Based on Interference which adds ransom value to actual data
  • 6. Privacy Protocols, Technologies and Algorithms (Contd..) Distributed Data Mining: An algorithm based on secure multi-party computation Privacy Enhancing Technologies: Methods of data protection in accordance with law
  • 7. Information Security Methods used for the protection of data Principles are: Confidentiality, Integrity and Availability
  • 8. Threats on digital information Viruses Worms Phishing attacks Trojan horses Theft of intellectual property Identity theft Sabotage Ransomware
  • 9. Security Enforcement Access Control:Identification, Authorization, Authentication Application Security: Antivirus,Secure Coding, Encryption Firewall Intrusion detection System Run Time Application Self Protection Mobile Secure Gateway
  • 10. Relation Between Privacy and Security PRIVACY IS ABOUT SAFEGUARDING THE USER WHEREAS SECURITY IS ABOUT PROTECTION OF DATA PRIVACY CANNOT EXIST WITHOUT SECURITY WHEREAS SECURITY CAN EXIST WITHOUT PRIVACY.
  • 11. Concerns Health care: protection of patient records Sensor Networks: Protection of huge amount of data generated by sensors Online Business: Protection of consumer records and bank details Social Media: Protection of personal details and chat history of users
  • 12. Conclusion • The term Information privacy and security are closely related, where privacy cannot exist without security whereas security can exist without privacy. • The threats of information can be from hackers, vulnerabilities in software, lack of transparency in privacy policies, collection of unnecessary data, personal data sharing, data transfer over insecure channels etc. • https://www.youtube.com/watch?v=6vNxslcf9A E
  • 13. References Anthony D, M, Ana Fernandez 2001, ‘Consumer Perceptions of Privacy and Security Risks for Online Shopping’, vol. 35, no. 1, pp. 27-44. Dimitrova, A & Brkan, M 2018, ‘Balancing National Security and Data Protection: The Role of EU and US Policy-Makers and Courts before and after the NSA Affair’, JCMS: Journal of Common Market Studies, vol. 56, no. 4, pp. 751-67. France Belanger & crossler, RE 2011, ‘Privacy in the Digital Age: A Review of Information Privacy Research in InformationSystems’, MIS Quarterly, vol. 35, no. 4, pp. 1017-41. Kagal L, FT, Joshi A, Greenspan S. 2006, ‘Security and Privacy Challenges in Open and Dynamic Environments’, Computer, vol. 39, no. 6, pp. 89-91. Li, C & Liu, H-w 2015, ‘A Review of Privacy Protection in E-commerce’, Journal of Advanced Management Science, pp. 50-3. Marci Meingast, TRSS 2006, ‘Security and Privacy Issues with Health Care Information Technology’, in International Conference of the IEEE Engineering in Medicine and Biology Society, New York, NY, USA. Meng, X 2008, ‘Analyze and Prevent the Security Risks of E-Commerce Privacy’, paper presented to 2008 International Conference on Management of e-Commerce and e- Government.
  • 14. References Santosh Krishna Putchala, KB, R Anitha 2013, ‘Information security challenges in social media interactions: strategies to normalize practices across physical and virtual worlds’, paper presented to DSCI - Best Practices Meet, Chennai, India, 12-12 July 2013. Weber, RH 2010, ‘Internet of Things – New security and privacy challenges’, Computer Law & Security Review, vol. 26, no. 1, pp. 23-30. Xin He, WPT 2017, ‘Multilayer Sensor Network for Information Privacy’, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, USA.