SlideShare ist ein Scribd-Unternehmen logo
INTRODUCTION
 As people use computers for a variety
 of purposes, confidential
 information, confidential
 communications, and personal
 choices can be registered in a variety
 of ways.
 Internet privacy is a broad term
 referring to the various
 concerns, technologies, and strategies
 for protecting
 information, communications, and
 choices that are meant to be private.
   If you choose to shop online, use
    social networking sites, play online
    games, or participate in
    forums, Internet privacy can become
    an issue in a number of ways.

   If your passwords are exposed, your
    identity can be fraudulently used or
    even stolen.

   If your contact information is passed
    around, you may be subject to spam.
   If your browsing history becomes
    public, people will know what you’ve
    been looking at online.

   Fortunately, taking certain precautions
    can reduce the privacy risks that you
    face.
   Strong passwords that are kept secret
    are one way to safeguard
    your Internet privacy.

   The strongest passwords have certain
    characteristics: they have no personal
    information, they don’t use real
    words, they combine upper and
    lowercase characters with numbers, and
    they are at least eight characters long.

   It is important to note, however, that the
    strongest password does no good if
    someone else can access it.
    Browser privacy settings, which
    control elements like storage of your
    browsing and download history and
    the acceptance of cookies, are there
    for you to alter to meet your
    preferences

   Similarly, social networking sites have
    settings to allow you to control the
    level of privacy of various postings you
    may make.
 Note that the default settings may be
  skewed towards the public exposure
  of information rather than towards
  Internet privacy.
 Facebook has been criticized on this
  point.
 For some sites , make sure you read
  the privacy terms before signing up. In
  that, your main choice usually is to
  become a participant, often with
  an email address attached to your
  user name, which may or may not be
  your real name.
 As an alternative, you may be able to
  take advantage of guest privileges, if
  they are offered, or be limited to
  reading, but not posting.
   Accidental violation
    of Internet privacy can also occur.

   This would be the case if somebody
    accidentally or unthinkingly forwarded an
    email to multiple parties that was only
    meant for one person, or neglected to
    omit a personal comment from the
    sender before resending.

   Though this can best be avoided by
    rigorously separating work and personal
    emails, this is not always a practical
    solution. Careful attention and discretion
    are the only real safeguards.
Internet privacy: why it is
important
  Teens and young adults are the most
  creative users.
 Personal information :
        Name, Address, etc…
 Technology increases risk.


   28th jan 2008 celebrates Data privacy
    day.
Privacy : what is it ?
   Privacy is the right or oppurtunity to
    decide who has to access to your
    personal information.
You can’t get something for
nothing
   The cost of social networking

   You may participate in all social
    networking in free but …..

    You have to provide personal
    information.
Profits from info.
   Website operaters

   Companies want to sell you things

   Mobile companies
Ways to protect your privacy
   Use of age and identity verification.

    Use services that allow you to report
    inappropriate content.
Adjust privacy settings
   Adjust your privacy settings.

   Use of https.

   Double security standards.

   Use of strong passwords.
Privacy policy should provide
   Notice

   Choice

   Access

   Security
Security risks
   Passwords

   File sharing

   Spyware

   Phishing

   Updating
solutions…..
   cookie control

   anti virus software

   firewalls

   encryption tools
Two absolute choices
   Raise awareness of privacy

   Learn to safeguard your privacy with
    minimum sacrifice of your convinence
Security for privacy

   Internet security is a branch of
    internet privacy specifically related to
    the Internet often involving browser
    security

   The Internet represents an insecure
    channel for exchanging information
    leading to a high risk of intrusion or
    fraud, such as phishing.
Types of Internet security
   Network layer security

   Ipsec protocol

   Biometric security
Network layer security

   IP can be made secure with the help
    of cryptographic methods and
    protocols that have been developed
    for securing communications on the
    Internet.
Ipsec protocol
  This protocol is designed to protect
  communication in a secure manner
  using IP.
 It is a set of security extensions
  developed by IETF, and it provides
  security and authentication at the IP
  layer by using cryptography.
   To protect the content, the data is
    transformed using encryption
    techniques.

 There are two main types of
  transformation that form the basis of
  IPsec:
 the Authentication Header (AH) and
  Encapsulating Security Payload
  (ESP).
Biometric security
  Biometrics (or biometric
  authentication) refers to the
  identification of humans by their
  characteristics or traits.
 Computer science, biometrics to be
  specific, is used as a form of
  identification and access control.
Forms or types…
   Palm check
   Retina check
   Heartbeat and pulse rate
   Finger tips check
   Voice commands
   Imagination (under construction)
conclusions….
   Internet privacy can be provided upto
    a limit.

   Awareness should be increased.

 Privacy tips should be adopted by net
 users.
 latest technology enhances security
 like cloud computing.
INTERNET PRIVACY

Weitere ähnliche Inhalte

Was ist angesagt?

Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
leahg118
 

Was ist angesagt? (20)

Lesson iii-security-and-data-protection
Lesson iii-security-and-data-protectionLesson iii-security-and-data-protection
Lesson iii-security-and-data-protection
 
Cyber Safety Class 9
Cyber Safety Class 9Cyber Safety Class 9
Cyber Safety Class 9
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
GuardianGabriel
GuardianGabrielGuardianGabriel
GuardianGabriel
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime & Cybersecurity
Cybercrime & CybersecurityCybercrime & Cybersecurity
Cybercrime & Cybersecurity
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 

Ähnlich wie INTERNET PRIVACY

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Ähnlich wie INTERNET PRIVACY (20)

Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Fp611 kuliah 2
Fp611 kuliah 2Fp611 kuliah 2
Fp611 kuliah 2
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Internet Security Essay
Internet Security EssayInternet Security Essay
Internet Security Essay
 
techalpha07
techalpha07techalpha07
techalpha07
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
EDU 01SEMINAR.pdf
EDU 01SEMINAR.pdfEDU 01SEMINAR.pdf
EDU 01SEMINAR.pdf
 
Chp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptxChp4:Data and Privacy.pptx
Chp4:Data and Privacy.pptx
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 

Kürzlich hochgeladen

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Kürzlich hochgeladen (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 

INTERNET PRIVACY

  • 1.
  • 2. INTRODUCTION  As people use computers for a variety of purposes, confidential information, confidential communications, and personal choices can be registered in a variety of ways.  Internet privacy is a broad term referring to the various concerns, technologies, and strategies for protecting information, communications, and choices that are meant to be private.
  • 3. If you choose to shop online, use social networking sites, play online games, or participate in forums, Internet privacy can become an issue in a number of ways.  If your passwords are exposed, your identity can be fraudulently used or even stolen.  If your contact information is passed around, you may be subject to spam.
  • 4. If your browsing history becomes public, people will know what you’ve been looking at online.  Fortunately, taking certain precautions can reduce the privacy risks that you face.
  • 5. Strong passwords that are kept secret are one way to safeguard your Internet privacy.  The strongest passwords have certain characteristics: they have no personal information, they don’t use real words, they combine upper and lowercase characters with numbers, and they are at least eight characters long.  It is important to note, however, that the strongest password does no good if someone else can access it.
  • 6. Browser privacy settings, which control elements like storage of your browsing and download history and the acceptance of cookies, are there for you to alter to meet your preferences  Similarly, social networking sites have settings to allow you to control the level of privacy of various postings you may make.
  • 7.  Note that the default settings may be skewed towards the public exposure of information rather than towards Internet privacy.  Facebook has been criticized on this point.
  • 8.  For some sites , make sure you read the privacy terms before signing up. In that, your main choice usually is to become a participant, often with an email address attached to your user name, which may or may not be your real name.  As an alternative, you may be able to take advantage of guest privileges, if they are offered, or be limited to reading, but not posting.
  • 9. Accidental violation of Internet privacy can also occur.  This would be the case if somebody accidentally or unthinkingly forwarded an email to multiple parties that was only meant for one person, or neglected to omit a personal comment from the sender before resending.  Though this can best be avoided by rigorously separating work and personal emails, this is not always a practical solution. Careful attention and discretion are the only real safeguards.
  • 10. Internet privacy: why it is important  Teens and young adults are the most creative users.  Personal information : Name, Address, etc…  Technology increases risk.  28th jan 2008 celebrates Data privacy day.
  • 11. Privacy : what is it ?  Privacy is the right or oppurtunity to decide who has to access to your personal information.
  • 12. You can’t get something for nothing  The cost of social networking  You may participate in all social networking in free but …..  You have to provide personal information.
  • 13. Profits from info.  Website operaters  Companies want to sell you things  Mobile companies
  • 14. Ways to protect your privacy  Use of age and identity verification.  Use services that allow you to report inappropriate content.
  • 15. Adjust privacy settings  Adjust your privacy settings.  Use of https.  Double security standards.  Use of strong passwords.
  • 16. Privacy policy should provide  Notice  Choice  Access  Security
  • 17. Security risks  Passwords  File sharing  Spyware  Phishing  Updating
  • 18. solutions…..  cookie control  anti virus software  firewalls  encryption tools
  • 19. Two absolute choices  Raise awareness of privacy  Learn to safeguard your privacy with minimum sacrifice of your convinence
  • 20. Security for privacy  Internet security is a branch of internet privacy specifically related to the Internet often involving browser security  The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing.
  • 21. Types of Internet security  Network layer security  Ipsec protocol  Biometric security
  • 22. Network layer security  IP can be made secure with the help of cryptographic methods and protocols that have been developed for securing communications on the Internet.
  • 23. Ipsec protocol  This protocol is designed to protect communication in a secure manner using IP.  It is a set of security extensions developed by IETF, and it provides security and authentication at the IP layer by using cryptography.
  • 24. To protect the content, the data is transformed using encryption techniques.  There are two main types of transformation that form the basis of IPsec:  the Authentication Header (AH) and Encapsulating Security Payload (ESP).
  • 25. Biometric security  Biometrics (or biometric authentication) refers to the identification of humans by their characteristics or traits.  Computer science, biometrics to be specific, is used as a form of identification and access control.
  • 26. Forms or types…  Palm check  Retina check  Heartbeat and pulse rate  Finger tips check  Voice commands  Imagination (under construction)
  • 27. conclusions….  Internet privacy can be provided upto a limit.  Awareness should be increased.  Privacy tips should be adopted by net users.  latest technology enhances security like cloud computing.