11
PRIVACY!!! Done by aimane

P R I V A C Y!!!

  • Upload
    aimane

  • View
    265

  • Download
    0

Embed Size (px)

Citation preview

Page 1: P R I V A C Y!!!

PRIVACY!!!

Done by aimane

Page 2: P R I V A C Y!!!

WHAT IS PRIVACY???

Privacy has no definite boundaries and it has different meanings for different people. It is the ability of an individual or group to keep their lives and personal affairs out of public view, or to control the flow of information about themselves.

Page 3: P R I V A C Y!!!

EXAMPLE OF PRIVACY

• Daily life• Bank account number• Social life• Secret• Government Document

Page 4: P R I V A C Y!!!

Privacy in ICT

• Refers to data and information data.

• Information privacy is described as the rights of individual and companies to deny and restrict the collection and use of information about them.

Page 5: P R I V A C Y!!!

Example of computer technology threaten privacy of data• Cookies• Electronic profile• Spyware

Page 6: P R I V A C Y!!!

Cookies

• Identify users by web-casting,e-commerce and another web application.

• Saved in the computer hard disk.• Used by some website to store

passwords and track how regularly we visit a website and become potential targets for web advertiser.

• Used for future, collected details then sold to any company that request for it.

Page 7: P R I V A C Y!!!

Electronic Profile

• Combination of data in a database that can be sold to the internet by the company to the interested parties.

• Example-Magazine subscription or product warranty card that had been filled by online subscribe.

Page 8: P R I V A C Y!!!

Spyware

• Program that collects users information without the users knowledge.

• Can enter computer like virus.• It’s a result of installing new

program.

Page 9: P R I V A C Y!!!

Why need privacy??

• For anonymity• For confidentiality• Do not our private lives and habits

exposed to third parties.

Page 10: P R I V A C Y!!!

Can be protected!!!

• Privacy law. Example-• Security services-to review the security policy• Security management-to protect the resources• Security mechanism-to implement the

required security services• Security object-the important entities within

the system enviroment• Utilities software. Example-• Firewall,anti spyware,anti virus,anti spam

program.

Page 11: P R I V A C Y!!!

REFERENCE

• http://en.wikipedia.org/wiki/Privacy