tech topic privacy

Post on 13-Dec-2014

393 Views

Category:

Business

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

Tech Topic: Privacy

By: David Chait, Steven Gonzalez, Travis Lopez, Kristen Magno, Steven Osaki

What is Computer Privacy?

The ability to control what information one reveals about

oneself, and to control who can access that information.

Summary

• History and cases of privacy• Current legislation• Future potential concerns and threats• Tips on how to protect yourself

DIGITAL U: A Loss of Privacy? http://www.youtube.com/watch?v=W31Xy2wp7wc

VIDEO

Whose privacy is at risk?

Everyone Is At Risk

• Applicants• Students• Individuals Engaged with Large Firms• The Unsuspecting Public

Applicants

• Harvard’s student database was hacked exposing over 10,000 applicants from 2007

• This information was placed on Bittorrent

Students• Our information has been

made widely available within our own institutions, and at times is vulnerable to loss.

• University of Texas at Austin – McCombs School of Business was compromised on April 24, 2006 placing 197,000 people at risk

• In May of 2006, the Texas Student Loan Corporation lost the records of 1.7 million borrowers.

Individuals Engaged with Large Firms

• Stanford suffers a theft of 72,000 records relating to employees hired prior to September of 2007.

• Ernst and Young loses a laptop containing thousands of IBM employee Records

• On May 22,2006 The Department of Veterans Affairs reports the theft of 28,600,000 records (All vets discharged between 1975 and 2006). o The information was stolen from an employee’s

home computero A federal Judge has ordered restitution over 20

million dollars due to this attack

The Unsuspecting Public

• Data Aggregation - The warehousing, repackaging, and resale of information about us.

• ChoicePoint loses information about 145,000 individuals with which it has no business relationship.

Legislation & Beyond

Key Legislation

• Patriot Act• Foreign Intelligence

Surveillance Act (FISA)

• Real ID Act - The Creation of a National ID Card. 

Surveillance Technology    

• ECHELON • Used by the United States National Security Agency (NSA)

to intercept and process international communications through satellites

• System is able to intercept messages over the internet messages over the internet

• System can also use orbiting satellites to monitor signals anywhere on the earth’s surface

• MAIN PURPOSE: to extract information and intelligence illicitly from millions of messages every day, across the globe

• NSA and allies have worked to limit/prevent privacy of international telecommunications

• The Echelon system has abilities to eavesdrop on everyday communications and to watch everything that is being said and done in the world

Advertising Technologies

Technologies • Cookies• Pixels• Web Bugs• Spyware

Implications• Building Profiles of everyone. • Understanding everyone's

interests.• Tracking your movement all

around the web.  • Overall...knowing what you do,

when you do it, what you like, who you know, and what your opinion is on certain topics is very sensitive information. 

Privacy / Civil Liberty Organizations

• Electronic Frontier Foundation (EFF.org)

• American Civil Liberties Union (ACLU)

• Electronic Privacy Information Center (EPIC)

• Privacy Coalition   Advice: Be aware of the services you use and the data

you provide to each of them. Be informed of the latest privacy battles happening in the media and understand that everything you do online is archived forever! 

Potential Concerns and Threats

Threats : Spam

• Abuse of electronic messaging systems to send unsolicited messages constantly

• Mostly found in your emails

Spyware

• A type of malware that is installed on computers and collects little bits of information at the time about users without their knowledge

Malware

• Software designed to infiltrate a computer system without the owner’s informed consent

• It includes worms, trojans, and rootkits

• Make sure you computer has protection

Hackers

• A person who breaks into computers usually by gaining access to administrative controls

• Beware, they are out there

Identity Theft

• Fraud that involves someone pretending to be someone else in order to steal money or get other benefits.

• Anytime you put your credit card number or any other personal information out on the web, its capable of being stolen.

Phishing

http://www.youtube.com/watch?v=sqRZGhiHGxg

Phishing Scams http://www.youtube.com/watch?v=sqRZGhiHGxg

VIDEO

Certain ways your privacy is viewed

• Cookies, which has been around for awhile.

• Facebook, Twitter, and Myspace are websites where people in our society today post personal information about themselves, which can be viewed by anyone including employers.

Tips on How to Protect Yourself

Software

• Anti-virus (AVG)• Anti-spyware (Lavasoft

Ad-aware)• Firewall (ZoneAlarm)• P2P (PeerBlock)

• http://epic.org/privacy/tools.html

The Browser

• Security/Privacy Add-ons (Cookie Management)

• Website Security– HTTPS and Padlock– Privacy Policies– Privacy Seals (TRUSTe)

Protecting your E-mail

• Use different e-mails for different web activities.

• Free webmail services (Hushmail, Mailvault, S-mail)

• Pretty Good Privacy (PGP)

Browsing the Internet

• TOR, The Onion Router, Sponsored by the Electronics Frontier Foundation.

• Anonymizer browsing services

• tor.eff.org• www.anonymizer.co

m

• Yahoo – 90 Days• Google – 9 Months• Microsoft – 18

Months

Summary

• History and cases of privacy• Current legislation• Future potential concerns and threats• Tips on how to protect yourself

http://www.youtube.com/watch?v=R7yfV6RzE30

VIDEO

WORKS CITED LIST• www.idsafe.us• http://news.cnet.com/8301-10789_3-9893174-57.html• http://www.computerworld.com/s/article/110813/Breach_at_Univ._of_

Texas_Austin_exposes_data_on_197_000_people• http://www.consumeraffairs.com/news04/2006/06/student_loan_loss.

html• http://www.securitymanagement.com/news/stanford-university-lapto

p-stolen-72-000-risk-identity-theft• http://www.theregister.co.uk/2006/03/15/ernstyoung_ibm_laptop/• http://www.networkworld.com/news/2006/060606-active-duty-troop-i

nformation-part-of.html?nwwpkg=slideshows• http://www.msnbc.msn.com/id/6979897/

top related