privacy of information technology
TRANSCRIPT
-
8/8/2019 Privacy of Information Technology
1/13
PRIVACY OF INFORMATIONPRIVACY OF INFORMATION
TECHNOLOGYTECHNOLOGY
-
8/8/2019 Privacy of Information Technology
2/13
-
8/8/2019 Privacy of Information Technology
3/13
Powerpoint Templates
Page 3
Concept of E-Privacy & Data Protection in
Cyberspace
In the Internet Era, larger amounts of information is
collected and there are greater risk that such
information will be disclosed.
Maintaining of databases is not as much difficult task
as maintaining its integrity, so in this era the mostconcerned debate is going on to innovative a perfect
method of data protection.
-
8/8/2019 Privacy of Information Technology
4/13
Powerpoint Templates
Page 4
In the electronic age, complete control over our
privacy is not possible as we leave behind a trail of
data, which often contains personal information,
such as credit card, insurance, banks, hospitals,schools, tax, credit history, telephone etc. this can
be analyzed from the following illustrations:-
1. On every login to the e-mail account in the cyber
cafes, the electronic trail of password remained
left there unsecured.
-
8/8/2019 Privacy of Information Technology
5/13
Powerpoint Templates
Page 5
2. On every use of credit card for purchasing purpose,
the trail of brand preference, place of shopping etc.left behind.
3.A list of technologies that have the potential to
impact on privacy like Biometrics (such asfingerprints, hand geometry, face, voice, iris and
keystroke recognition),Radio frequency
identification (RFID),Smart cards, Voice over
Internet Protocol (VoIP),Wireless technologies,Location detection technologies (like Global
Positioning Systems),Data-matching and data
mining technologies, Surveillance Technologies
-
8/8/2019 Privacy of Information Technology
6/13
Powerpoint Templates
Page 6
Privacy in Technology Driven World
There are means to capture digital footprints of user, who is
browsing internet for various reasons. It all begins with
capturing IP address. An Internet Protocol address (IP address)
is a numerical label that is assigned to devices participating in
a computer networkthat uses the Internet Protocol forcommunication between its nodes.
Whenever a person browses, sends e-mails, chats online, he
leaves distinctive IP address behind. By searching IPregistration database or conducting trace out, approximate
physical location of IP address can be determined.
-
8/8/2019 Privacy of Information Technology
7/13
Powerpoint Templates Page 7
Other surveillance technologies used are: cookies, GlobalUnique Identifies (GUID), Web Bugs, e-mail or documentbugs & spy ware
1. Cookies -
It is a block of text (digital identification tags) which the
website places in a file on a computer hard disk of a personto track his activity.
2. GUID -
Globally Unique Identifier (GUID) is software embedded inthe computers hardware. It can be read remotely from acrossthe network. For example:- If GUID embedded on Ethernetcards, used in LAN. Then you will listen all privateconversation / information's of all the computers connectedthrough LAN.
-
8/8/2019 Privacy of Information Technology
8/13
Powerpoint Templates Page 8
3. Web Bugs -
These are being increasingly used by online advertisers to
create users database. It occurs even though the person has not
clicked on the banner ad.
4. SPYWARE -
Some software developers have included code with in their
applications that cause the users computer to transmitinformation back to the software developer Via Internet.
-
8/8/2019 Privacy of Information Technology
9/13
Powerpoint Templates Page 9
Privacy & Data Protection Issues in IT Age
BPO & Call Centre -
India is preferred destination for offshore Business
Outsourcing (Financial, Education, Legal, Banking,
Healthcare, Marketing, Telecommunications services).
Telemarketing-
India is faced with a new phenomenon called telemarketing
which has invaded millions of hapless Indians thanks to the
widespread use of mobile phones and multiplicity of mobile
telephone service providers in India.
-
8/8/2019 Privacy of Information Technology
10/13
Powerpoint Templates Page 10
The first step to data security is that to ensuring that all
connections to important storage are made over virtual
private network (VPN) channels.
Hardware requirements for access (such as one-time
numerical password generators) and rejection of connection
attempts over unencrypted channels are important methods.
All data should be in encrypted form.
HOW TO MAINTAIN PRIVACY
-
8/8/2019 Privacy of Information Technology
11/13
Powerpoint Templates Page 11
-
8/8/2019 Privacy of Information Technology
12/13
Powerpoint Templates Page 12
A virtual private network (VPN) is a computer network that uses a
public telecommunication infrastructure such as the Internet to provide
remote offices or individual users with secure access to their
organization's network Secure VPNs use cryptographic tunneling protocols to provide
confidentiality by blocking intercepts and packet sniffing, allowing
sender authentication to block identity spoofing, and provide message
integrity by preventing message alteration.
Secure VPN protocols include the following: IPsec (Internet Protocol Security) was originally developed for IPv6,
which requires it. This standards-based security protocol is also widely
used with IPv4. L2TP frequently runs over IPsec.
Transport LayerSecurity (SSL/TLS) can tunnel an entire network's
traffic, as it does in the Open VPN project, or secure an individual
connection. A number of vendors provide remote access VPN
capabilities through SSL. An SSL VPN can connect from locations
where IPsec runs into trouble with Network Address Translation and
firewall rules.
-
8/8/2019 Privacy of Information Technology
13/13
Powerpoint Templates Page 13
A globally unique identifier or GUID is a special type of identifier used
in software applications to provide a unique reference number. The
value is represented as a 32 character hexadecimal string, such as
{21EC2020-3AEA-1069-A2DD-08002B30309D}and usually stored as a 128 bit integer. The term GUID usually, but not
always, refers to Microsoft's implementation of the Universally Unique
Identifier (UUID) standard.
GUIDs are used in software development as database keys,component identifiers, or just about anywhere else a truly unique
identifier is required. GUIDs are also used to identify all interfaces and
objects in COM programming.