personal privacy and security
DESCRIPTION
Personal Privacy and Security. Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University. Introduction. Internet: Good or Bad? Privacy/Security Issues Victims? What victims? Scams: How hard are they to spot? Scams: FBI/NW3C. Which ones have you heard of? - PowerPoint PPT PresentationTRANSCRIPT
Personal Privacy and Security
Zenia C. Bahorski Ph.D.Department of Computer Science
Eastern Michigan University
Personal Privacy & Security - Z. Bahorski, May 2012 1
Introduction• Internet: Good or Bad?• Privacy/Security Issues• Victims? What victims?• Scams: How hard are they to spot?• Scams: FBI/NW3C. Which ones have you heard
of?• Privacy Threats• Tips to protect yourself• Security Threats• Tips to protect your computer
Personal Privacy & Security - Z. Bahorski, May 2012 2
Internet: Good or Bad?
• “Good” uses of the Internet
• “Bad” uses of the Internet
Personal Privacy & Security - Z. Bahorski, May 2012 3
Personal Privacy & Security - Z. Bahorski, May 2012 4
Where the hackers are from!Trustwave Global Security Report 2012.pdf
Internet: Good or Bad?
Should we keep it anyway?
Quote:
http://www.coursesmart.com/9780136008859/chap01#
Personal Privacy & Security - Z. Bahorski, May 2012 5
Privacy/Security Issues:
• What’s in a name?– Names with Positive connotations– Names with Negative connotations
Personal Privacy & Security - Z. Bahorski, May 2012 6
Privacy/Security Issues:
• How can people find information about us?
Personal Privacy & Security - Z. Bahorski, May 2012 7
• Can we really remain anonymous when we use the Web?– How much can a web site tell about you and your
computer just by you connecting to their web site?• Go to: http://cyscape.com/showbrow.asp?bhcp=1
• To whom is it advantageous to gather information about you?– Go to: http://www.spokeo.com
Personal Privacy & Security - Z. Bahorski, May 2012 8
Privacy/Security Issues:
Privacy/Security Issues:
• Computers NEVER forget!– Sign in to Google or Gmail– In location box, type in:• http://www.google.com/history
–Why DOES Google keep track of • Key words in Gmail• Search phrases
Personal Privacy & Security - Z. Bahorski, May 2012 9
Victims? What victims?
• According to the United States Census:– there are now 313,310,928 million people in the
United States with over 7 billion in the world (USCB, 2012).
– The Federal Trade Commission (FTC) estimates that, “as many as 9 million Americans have their identities stolen each year” (FTC, n.d.).
– That is almost 3 percent of the American population!
Personal Privacy & Security - Z. Bahorski, May 2012 10
Victims? What victims?
• Identity theft– Using another person’s name, personal identification
(driver’s license number, social security number), credit card, or banking information for personal gain• Taking advantage of credit history to:*
– Buy a car (turn around quickly at an auction house)– Buy a house
• Taking advantage of credit card or banking info:– Get cash– Open and pay for a cell phone account– Buy goods or services
• Get government documents – for their new identity!Personal Privacy & Security - Z. Bahorski,
May 2012 11
Victims? What victims?Identity theft – What to do if you are a victim:
– Keep a DETAILED log including dates, times, names and numbers called.
Do these 4 things:1.Call or go online and place a fraud alert:
– TransUnion: 1-800-680-7289; www.transunion.com;– Equifax: 1-800-525-6285; www.equifax.com;– Experian: 1-888-EXPERIAN (397-3742); www.experian.com;
2.Close the accounts that have been compromised.3.File a complaint with the FTC to help police track like-thefts.4.File a police report (give them a copy of your FTC complaint to add to the police report).From the FTC at: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html Personal Privacy & Security - Z. Bahorski,
May 2012 12
Privacy Threats
• Surveillance:– Cameras
• Look up! Cameras are “everywhere” (public places and in private places where posted) Look for these! You’ll be amazed!
• Case: Don’t take pictures in private places– Cookies
• For an explanation of cookies, go to:• http://www.cookiecentral.com/n_cookie_faq.htm#what_are
– Spying on Cell Phones: go to http://www.mobilespytool.com/
Personal Privacy & Security - Z. Bahorski, May 2012 13
Privacy Threats
• Surveillance cont…– Keyloggers
• Record keys pressed on keyboard: Hardware or Software (easy to do, directions are available on the Internet!)
• How to Add a keylogger: http://www.youtube.com/watch?v=0X9kNpOJiNQ
– Is “FREE” Internet really “free”? • Be careful of fake wi-fi
– Just how much surveillance is allowed in the workplace?• Go to: http://www.youtube.com/watch?v=lO3wuYiITiE
Personal Privacy & Security - Z. Bahorski, May 2012 14
Tips to Protect Yourself!
Personal Privacy & Security - Z. Bahorski, May 2012 15
Tips to Protect Yourself!• Protecting yourself online:– (my 6th): Do not reply to an email to “unsubscribe”!– (my 7th): NEVER post anything online that you don’t
want posted on a billboard on I-94! • Includes: Personal information, pictures, poetry,
reports (papers), etc.• Facebook (and their “partners”) can USE any picture
that you post for any reason. • ANY employer (current or future) can view anything
you post onto Facebook. (Don’t think that only your friends can see your stuff.) They can pay for this.
– (my 8th): Don’t use information (such as pet names) as passwords if you include that info online.
Personal Privacy & Security - Z. Bahorski, May 2012 16
Tips to Protect Your Computer!• Protecting your computer:– Tips to help you protect your computer from viruses
and spyware:1. Keep your Operating System updated (don’t ignore
updates!)2. Install a firewall3. Install antivirus software (2 if you can)4. Do not open attachments from unknown sources5. Do not run programs that you’ve downloaded from online
unless you check it for viruses first! 6. Do not download from unknown sites.7. Do not click on ads8. DO surf wisely! Is the site REALLY worth the RISK?
Personal Privacy & Security - Z. Bahorski, May 2012 17
Contact Information
• Zenia C. Bahorski Ph.D.• 511 Pray-Harrold Hall• Department of Computer Science• Eastern Michigan University
• Email: [email protected]• Web page: people.emich.edu/zbahorski• Images: Microsoft Clipart
Personal Privacy & Security - Z. Bahorski, May 2012 18