Privacy and the Internet - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

Privacy and the Internet

Description:

Or spammers use programs to randomly generate e-mail addresses. ... Use an on-line identity and free email service to protect against giving out ... – PowerPoint PPT presentation

Number of Views:138
Avg rating:3.0/5.0
Slides: 14
Provided by: rach185
Category:

less

Transcript and Presenter's Notes

Title: Privacy and the Internet


1
Privacy and the Internet
  • By,
  • Rachel Hoeschen

2
Table of Contents
  • The Threats
  • Cookies
  • Web bugs
  • Browsers
  • Spy ware
  • Phishing
  • Your info
  • Spam
  • What can you do about it?
  • Sources

3
Threats to Your Privacy The Biggies..
Cookies
Web Bugs
Browsers
Spy ware
Phishing
Your Information
Spam
4
Cookies or HTTP CookiesFar from the cookie
monsters favorite treat
  • Data that is inserted on your hard drive that
    stores information about previously visited web
    sites
  • they tailor web sites based on your interests
  • . Most are used only by the web site that put the
    cookie in place but.
  • The elusive
  • Third-Party Cookies, gather information about
    you and then sells that data to other marketers
  • Cookies in the News

5
Web bugs Creepy Crawlers that gather your
information
  • These allow third parties to see who is looking
    at a web page of message.
  • They can be used to confirm that a message or web
    page is being viewed and then record the IP
    address of the viewer.
  • Exterminate them by
  • by reading your email while offline
  • installing a software program that detects web
    bugs.                      

6
Browsersbrowsing through your personal
information as you read
  • They invisibly provide web site operators with
    information about your ISP and past web sites you
    have visited
  • Some web browsers, may also be tricked into
    reporting the user's default e-mail address,
    phone number, and other information found in your
    address book
  • The major browsers affected are Netscape
    Navigator and Microsoft Internet Explorer.

7
Spy wareNot the James Bond you know and trust
  • Malicious software designed to intercept or take
    partial control of a computer's operation without
    the informed
  • consent of that machine's owner or legitimate
    user.
  • It exploits infected computers for commercial
    gain. Such as pop- ups advertisements theft of
    personal information, monitoring of Web-browsing
    activity for marketing purposes or routing of
    HTTP requests to advertising sites.
  • As of 2005, spy ware has become one of the
    pre-eminent security threats to computer-systems
    running Microsoft Windows operating- systems and
    Internet Explorer.

8
PhishingFishing for your information
  • An email that looks official but is actually
    trying to trick the bank's members into giving
    away their account information by "confirming"
    sensitive information at the phisher's linked
    website.

9
Your Famous!But in the John Bobbitt way
  • With out your permission anyone can say what they
    want about you on the internet
  • Governments, schools, businesses and other
    organizations collect and may publish your
    personal information
  • They may also sell this info to businesses
  • or individuals
  • There is little or no law anywhere in the world
    governing this

10
SpamThe other, other, other white meat
  • junk e-mail
  • public sources (such as web sites online
    purchases and can be harvested for e-mail
    addresses)
  • These are then sold to spammers. Or spammers use
    programs to randomly generate e-mail addresses.
  • To much spam can compromise and slow down the
    whole network.
  • Annoying!
  • FYI Spam is now illegal in Australia.

11
Feeling taken advantage of yet?What are you
going to do about it?
  • 1. Only conduct business, visit sites or become
    involved with web sites that have adequate
    privacy policies that cover at least to whom
    your information will be passed onto, why the
    information is being collected, how the
    information will be used, and how you can access
    information the organization holds about you
  • 2. Install and use privacy enhancing software
    including
  • Firewall
  • Cookie Remover
  • Web Bug Remover
  • Anonymous Web Browsing
  • Encrypted Email
  • Advertising Filters
  • Anti-Spam Tools
  • Anti-Spyware Tools
  • Further Information
  • 3. Opt out of all further contact with
    organizations
  • 4. Only give as much personal information as you
    are comfortable with
  • 5. Use an on-line identity and free email service
    to protect against giving out your details to
    spammers

12
Dont Forget!
  • The workplace

Children
Law Enforcement
What does privacy mean to them?
13
Sources
  • http//en.wikipedia.org/wiki/Internet_privacy
  • http//www.privacyrights.org/fs/fs18-cyb.htm
  • http//www.privacy.gov.au/internet/internet_privac
    y/2
  • http//www.privacy.gov.au/internet/tools/index.htm
    l
  • http//www.privacy.org/
  • http//www.ftc.gov/bcp/conline/edcams/kidzprivacy/
  • http//www.sonic.net/undoc/extent.htm
Write a Comment
User Comments (0)
About PowerShow.com