SlideShare ist ein Scribd-Unternehmen logo
1 von 24
How to protect your 
identity on the Internet 
and VPNs 
Iulia Porneală 
CyberGhostVPN.com
Internet in numbers 
• 7.1 Billion people in the world 
• 2.5 Billion internet users in the world
Internet in numbers 2014 
Source: wearesocial.net
Internetul in numbers 2014 
• 1.1 Billion Facebook Accounts 
Source: wearesocial.net
What does the Internet know 
about you? 
• Computers and all other devices save traffic information about 
you 
• Each servers saves a log where the following information is 
recorded: 
• Your IP address associated with the content you are interested 
about 
• Your Downloads 
• Your Clicks 
• Your Internet Service Provider can easily associate your IP 
Address with: your name, your address, your age, your phone 
number
Activities that contribute to 
defining your online identity 
• Website navigation 
• Using a Search Engine 
• Registering to a Social Platform 
• Connecting your phone number to 
your accounts 
Every one of these activities is 
registered in a database (or several).
How is your online identity 
identified 
• Internet users are identified by their IP address alocated by the 
Internet Service Provider. 
What is an IP? 
• There is a communication standard called Internet Protocol / IP 
• IP is a number used exclusively by all the equipment related to 
information techonology (printers, routers, modems, computers) 
which allows them to identify and communicate between them in a 
computer network. 
• IP can give all the parameters determining the location of the 
internet user. From this point of view Internet access is completely 
transparent and can be dangerous
Internet today 
• Till 10 years ago the Internet was a place of diversity where 
everything was tolerated. 
• A place where everybody was feeling safe and communicating 
in complete freedom, practicing a new type of democracy. 
• Nowadays more and more organizations, entities and persons 
are interested in analyzing the internet traffic of individual 
users. 
• Practically at this moment freedom, security and anonymity 
online are only ideals hard to reach.
Who’s interested in your identity? 
• Website owners want to know everything there is to know about your 
interests to deliver you ads suited to your wants and needs. Or, bluntly 
put, to be able to sell your data to a third party or entity that solicits 
those. 
• Store owners who practice price discrimination policies, originating 
establishments or previous behavior (recurring visitors get higher prices, 
as the probability to buy the products increases). 
Movie industries from Hollywood to Bollywood, want to know where 
and what kind of videos are you viewing. 
• Governmental authorities, like secret services, want to know where you 
live, if you are planning to relocate, what you do, what you think, your 
political beliefs, your religious views – if you agree with them or not. 
• Organized and not-so-organized criminals, are closely watching your 
moves, especially the financial ones. Business owners are followed. 
Industrial espionage has never been as easy as it is today. 
• Companies which hire can investigate the behavior of their future 
candidates and choose discriminatory according the private life 
information of the applicant.
Comparison virtual identity 
versus real-life identity 
• If in real life we have organic systems that help us cope with 
dangers (hormonal, lizard brain, primary instinct or whatever 
you want to call it) in our virtual life this is not valid; 
• When you talk to somebody privately in real life, and a 3rd 
person is eavesdropping, you can notice, well online you have 
no idea when that is happening
Facebook 
• Facebook tracks activities for its users even when these are not 
logged in anymore. There are transmited towards the Facebook 
servers informations regarding your IP address and all websites that 
have a Like or Recommend button integrated. 
• The tracking is done based on cookies which remain in your browser 
even after logging off Facebook. The only method to stay safe is by 
periodically deleting these cookies, using different browsers or 
special apps that prevent this. 
• Facebook does not delete the information the users delete. Even 
the ones who have deleted their accounts are still monitored. 
• Both the website and mobile apps from Facebook are permanently 
monitoring your location. It seems that retaining users coordinates, 
will allow the company to sell publicity “calibrated” to the daily 
habits of the users.
Online Privacy 
• In current context, it is obvious to everybody that online 
privacy is a simple illusion. 
• You need to start from the premise that nothing we are doing 
online does not belong exclusively to us, that in the moment 
we share something, this thing is possible to be not only 
viewed by the recipient, but by many others also.
Methods to stay anonymous 
• If you use social networks, or other websites where your data is required, use 
aliases and not your real name 
• Use Security Questions instead of alternative email addreses 
• Make sure that the passwords you use are secure and different for every account 
• Use a disposable email address 
• Avoid using Google Search (you can use DuckDuckGo as an alternative search 
engine) 
• Avoid using websites which request your phone number, or at least do not 
provide it to them 
• Do not link your accounts between them 
• Check that all payment pages start with HTTPS 
• If you need to make online payments, use alternative methods to credit 
cards(paysafecard, Paypal) 
• Regularly update your operating system and antivirus 
• Use a firewall 
• Restrict remote access, except for very secure sources 
• Download only from trusted websites and sources 
• Install a VPN
What is a VPN? 
• A VPN or Virtual Private Network is a method used to add 
security and privacy to private and public networks, like WiFi 
Hotspots and the Internet. 
• A virtual private network (VPN) extends a private network 
across a public network, such as the Internet. 
• VPN enables a computer to send and receive data across 
shared or public networks as if it is directly connected to the 
private network, while benefiting from the functionality, 
security and management policies of the private network. 
• A VPN is created by establishing a virtual point-to-point 
connection through the use of dedicated connections, virtual 
tunneling protocols, or traffic encryptions.
How does a VPN work?
Encryption 
• In cryptography, encryption is the process of encoding messages or 
information in such a way that only authorized parties can read it. 
• Encryption does not of itself prevent interception, but denies the 
message content to the interceptor.
What are the advantage of 
using a VPN? 
• You can protect your online identity 
• You can get access to content and websites that are otherwise 
restricted (at the office, at school, in political context) 
• You surf the Internet seen as a user of the country of the IP you are 
using 
• Your internet identity becomes anonymous 
• You can view georestricted content (videos from Youtube, 
www.cbs.com, www.hulu.com) 
• Using wireless networks in public spaces without worries
Cybercrime 
The term of cybercrime is applied in the case of 3 categories of plică în 
cazul a trei categorii de criminal activities 
• The first category includes traditional form of crime like fraud or forgery, 
although in the case of cybercrime the context refers especially to the 
crimes committed using electronic communication networks and 
informational systems (electronic networks) 
• Second category includes publishing of illegal content in electronic 
environments (for example materials regarding child sexual abuse or 
incitement to racial hatred) 
• Third category includes crimes referring directly to electronic networks, 
for example attacks on the informational systems, A treia categorie 
include infracţiunile proprii reţelelor electronice , de exemplu, atacurile 
împotriva sistemelor de informare, denial of service and piracy. These 
types of attacks can target infrastructures of high importance in Europe 
and can affect the rapid alert systems from several areas, with 
potentially disastrous consequences for the entire society.
Online Censorship 
• Sorry, this website is not available in your country. 
• Online censorship represents a range from geo restrictions to 
political censorship like the Great Firewall of China. 
• Exemples: 
• In Iran Facebook is forbidden 
• In 2011 Egypt’s president, Mubarak, has banned Internet 
• In China (500 milion Internet users) Facebook, BBC, Youtube, 
Google, Twitter are banned
Victimes of the Internet 
• 35 killed journalists 
• 178 arrested journalists
Online identity theft 
• Internetul offers criminals new ways through which these can steal 
personal information and commit fraud. 
• Criminals ca use ways like spreading viruses which once they reach a 
comupter transmit username, passwords and personal details (like 
credit card details) 
• Phishing emails 
• Most of the webstes store information regarding the users, beeing 
exposed to such risks.
Edward Snowden and the 
Scandal NSA - PRISM 
• Snowden worked in the physical security department or technical 
department for the CIA and NSA 
• Until May 2013 he worked as a secret agent in the administration 
and consulting system for Booz Allen Hamilton 
• Through his job as a technical collaborator he had access to the top 
secret information of the American espionage system, of which we 
notice the ones obtained through the program of the agency NSA 
PRISM surveillance and espionage of the Internet networks 
• The program was making giants in the Internet domain like 
Microsoft, Apple or Google deliver their data to the NSA, in the basis 
of a "programatic warant " emitted by the IRS every year.
Thank you! 
@iuliamp 
Useful links 
• http://en.rsf.org/ 
• https://www.youtube.com/watch?v=dSXlKdWF5HE 
• https://www.youtube.com/watch?v=HcPLdRJyFuE 
• http://mashable.com/2013/03/27/tips-against-identity-theft/ 
How can use VPN 
• http://vimeo.com/64800089
WORKSHOP

Weitere ähnliche Inhalte

Was ist angesagt?

Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
Harsha Matta
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 

Was ist angesagt? (20)

SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 

Ähnlich wie How you can protect your online identity, online privacy and VPNs

Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
Chande Kasita
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 

Ähnlich wie How you can protect your online identity, online privacy and VPNs (20)

Cyber Safety ppt.pptx
Cyber Safety ppt.pptxCyber Safety ppt.pptx
Cyber Safety ppt.pptx
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Cyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptxCyber Safety & Cyber Crimes by me.pptx
Cyber Safety & Cyber Crimes by me.pptx
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Kasita's presentation
Kasita's presentationKasita's presentation
Kasita's presentation
 
Computer and internet fraud
Computer and internet fraudComputer and internet fraud
Computer and internet fraud
 
Protecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity TheftProtecting Yourself From Data and Identity Theft
Protecting Yourself From Data and Identity Theft
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 

Kürzlich hochgeladen

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Monica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 

Kürzlich hochgeladen (20)

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime BalliaBallia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
Ballia Escorts Service Girl ^ 9332606886, WhatsApp Anytime Ballia
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 

How you can protect your online identity, online privacy and VPNs

  • 1. How to protect your identity on the Internet and VPNs Iulia Porneală CyberGhostVPN.com
  • 2. Internet in numbers • 7.1 Billion people in the world • 2.5 Billion internet users in the world
  • 3. Internet in numbers 2014 Source: wearesocial.net
  • 4. Internetul in numbers 2014 • 1.1 Billion Facebook Accounts Source: wearesocial.net
  • 5. What does the Internet know about you? • Computers and all other devices save traffic information about you • Each servers saves a log where the following information is recorded: • Your IP address associated with the content you are interested about • Your Downloads • Your Clicks • Your Internet Service Provider can easily associate your IP Address with: your name, your address, your age, your phone number
  • 6. Activities that contribute to defining your online identity • Website navigation • Using a Search Engine • Registering to a Social Platform • Connecting your phone number to your accounts Every one of these activities is registered in a database (or several).
  • 7. How is your online identity identified • Internet users are identified by their IP address alocated by the Internet Service Provider. What is an IP? • There is a communication standard called Internet Protocol / IP • IP is a number used exclusively by all the equipment related to information techonology (printers, routers, modems, computers) which allows them to identify and communicate between them in a computer network. • IP can give all the parameters determining the location of the internet user. From this point of view Internet access is completely transparent and can be dangerous
  • 8. Internet today • Till 10 years ago the Internet was a place of diversity where everything was tolerated. • A place where everybody was feeling safe and communicating in complete freedom, practicing a new type of democracy. • Nowadays more and more organizations, entities and persons are interested in analyzing the internet traffic of individual users. • Practically at this moment freedom, security and anonymity online are only ideals hard to reach.
  • 9. Who’s interested in your identity? • Website owners want to know everything there is to know about your interests to deliver you ads suited to your wants and needs. Or, bluntly put, to be able to sell your data to a third party or entity that solicits those. • Store owners who practice price discrimination policies, originating establishments or previous behavior (recurring visitors get higher prices, as the probability to buy the products increases). Movie industries from Hollywood to Bollywood, want to know where and what kind of videos are you viewing. • Governmental authorities, like secret services, want to know where you live, if you are planning to relocate, what you do, what you think, your political beliefs, your religious views – if you agree with them or not. • Organized and not-so-organized criminals, are closely watching your moves, especially the financial ones. Business owners are followed. Industrial espionage has never been as easy as it is today. • Companies which hire can investigate the behavior of their future candidates and choose discriminatory according the private life information of the applicant.
  • 10. Comparison virtual identity versus real-life identity • If in real life we have organic systems that help us cope with dangers (hormonal, lizard brain, primary instinct or whatever you want to call it) in our virtual life this is not valid; • When you talk to somebody privately in real life, and a 3rd person is eavesdropping, you can notice, well online you have no idea when that is happening
  • 11. Facebook • Facebook tracks activities for its users even when these are not logged in anymore. There are transmited towards the Facebook servers informations regarding your IP address and all websites that have a Like or Recommend button integrated. • The tracking is done based on cookies which remain in your browser even after logging off Facebook. The only method to stay safe is by periodically deleting these cookies, using different browsers or special apps that prevent this. • Facebook does not delete the information the users delete. Even the ones who have deleted their accounts are still monitored. • Both the website and mobile apps from Facebook are permanently monitoring your location. It seems that retaining users coordinates, will allow the company to sell publicity “calibrated” to the daily habits of the users.
  • 12. Online Privacy • In current context, it is obvious to everybody that online privacy is a simple illusion. • You need to start from the premise that nothing we are doing online does not belong exclusively to us, that in the moment we share something, this thing is possible to be not only viewed by the recipient, but by many others also.
  • 13. Methods to stay anonymous • If you use social networks, or other websites where your data is required, use aliases and not your real name • Use Security Questions instead of alternative email addreses • Make sure that the passwords you use are secure and different for every account • Use a disposable email address • Avoid using Google Search (you can use DuckDuckGo as an alternative search engine) • Avoid using websites which request your phone number, or at least do not provide it to them • Do not link your accounts between them • Check that all payment pages start with HTTPS • If you need to make online payments, use alternative methods to credit cards(paysafecard, Paypal) • Regularly update your operating system and antivirus • Use a firewall • Restrict remote access, except for very secure sources • Download only from trusted websites and sources • Install a VPN
  • 14. What is a VPN? • A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. • A virtual private network (VPN) extends a private network across a public network, such as the Internet. • VPN enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. • A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions.
  • 15. How does a VPN work?
  • 16. Encryption • In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. • Encryption does not of itself prevent interception, but denies the message content to the interceptor.
  • 17. What are the advantage of using a VPN? • You can protect your online identity • You can get access to content and websites that are otherwise restricted (at the office, at school, in political context) • You surf the Internet seen as a user of the country of the IP you are using • Your internet identity becomes anonymous • You can view georestricted content (videos from Youtube, www.cbs.com, www.hulu.com) • Using wireless networks in public spaces without worries
  • 18. Cybercrime The term of cybercrime is applied in the case of 3 categories of plică în cazul a trei categorii de criminal activities • The first category includes traditional form of crime like fraud or forgery, although in the case of cybercrime the context refers especially to the crimes committed using electronic communication networks and informational systems (electronic networks) • Second category includes publishing of illegal content in electronic environments (for example materials regarding child sexual abuse or incitement to racial hatred) • Third category includes crimes referring directly to electronic networks, for example attacks on the informational systems, A treia categorie include infracţiunile proprii reţelelor electronice , de exemplu, atacurile împotriva sistemelor de informare, denial of service and piracy. These types of attacks can target infrastructures of high importance in Europe and can affect the rapid alert systems from several areas, with potentially disastrous consequences for the entire society.
  • 19. Online Censorship • Sorry, this website is not available in your country. • Online censorship represents a range from geo restrictions to political censorship like the Great Firewall of China. • Exemples: • In Iran Facebook is forbidden • In 2011 Egypt’s president, Mubarak, has banned Internet • In China (500 milion Internet users) Facebook, BBC, Youtube, Google, Twitter are banned
  • 20. Victimes of the Internet • 35 killed journalists • 178 arrested journalists
  • 21. Online identity theft • Internetul offers criminals new ways through which these can steal personal information and commit fraud. • Criminals ca use ways like spreading viruses which once they reach a comupter transmit username, passwords and personal details (like credit card details) • Phishing emails • Most of the webstes store information regarding the users, beeing exposed to such risks.
  • 22. Edward Snowden and the Scandal NSA - PRISM • Snowden worked in the physical security department or technical department for the CIA and NSA • Until May 2013 he worked as a secret agent in the administration and consulting system for Booz Allen Hamilton • Through his job as a technical collaborator he had access to the top secret information of the American espionage system, of which we notice the ones obtained through the program of the agency NSA PRISM surveillance and espionage of the Internet networks • The program was making giants in the Internet domain like Microsoft, Apple or Google deliver their data to the NSA, in the basis of a "programatic warant " emitted by the IRS every year.
  • 23. Thank you! @iuliamp Useful links • http://en.rsf.org/ • https://www.youtube.com/watch?v=dSXlKdWF5HE • https://www.youtube.com/watch?v=HcPLdRJyFuE • http://mashable.com/2013/03/27/tips-against-identity-theft/ How can use VPN • http://vimeo.com/64800089