Post on 24-Dec-2015
Privacy and Encryption
The threat of privacy due to the sale of sensitive personal information on the internet
Definition of anonymity and how it is abused by users
Technological developments and how they are eroding privacy and anonymity
Reasons why employers are monitoring employee’s computer usage
How public-key encryption threatens U.S. security, both foreign and domestic
The U.S. government’s proposed key recovery plan and how it threatens the growth of internet commerce
COMPUTERS IN YOUR FUTURE 2004COMPUTERS IN YOUR FUTURE 2004
What You Will Learn
What is identity theft?
Identity theft is obtaining enough information about an individual to open a credit card account in their name and charging items bought to that account
Examples of information needed are name, address, social security number and other personal information
Laws limit liability to $50 for each fraudulent charge
Affects credit reports
The Internet and privacy
Privacy refers to an individual’s ability to restrict the collection, use and sale of confidential personal information
The Internet is eroding privacy through web sites selling information collected through registration forms
Few laws regulate selling personal information
Privacy refers to an individual’s ability to restrict the collection, use and sale of confidential personal information
The Internet is eroding privacy through web sites selling information collected through registration forms
Few laws regulate selling personal information
The Internet and encryption
Encryption refers to the coding of information so that it is only readable by the intended recipient
Used in electronic commerce transactions and e-mail
Provides a way to use the Internet in a safe secure way
Could be used misused by criminals and terrorists
What is anonymity?
Anonymity is the ability to convey a message without disclosing one’s identity
It can be abused because it frees people from accountability
Defamation is the act of injuring someone’s reputation by making false statements
Libel occurs when malicious statements are made in writing
How is technology eroding privacy and anonymity?
Computers and the Internet enable marketing firms, snoops, and government officials to collect information in ways that are hidden from view
Methods used on the Internet are: Cookies Global Unique Identifiers (GUIDS)
What are cookies?
Cookies are small files that are written to an individual’s hard drive by web sites visited
Legitimate purposes include recording information for future use; Example: retail sites using “shopping carts”
Questionable practices include banner ad companies tracking a user’s browsing actions and placing banner ads on web sites based on those actions
Examples of cookies
What is a global unique identifier (GUID)?
A GUID is a unique identification number generated by hardware or a program
Used to send user information back to site that created it
Privacy in the workplace
Employees are given e-mail and Internet access at work
Companies concerned over employees wasting time surfing the net and sending personal e-mail
Three-quarters of large corporations monitor employees’ phone calls, e-mail, web browsing habits and computer files
Laws do not protect employees from being monitored
Some things to remember at work
1.Do not use the employer’s phone for personal calls
2.Do not use the employer’s e-mail for personal messages
3.Assume everything you do at work is being monitored
Protecting online privacy
1. Browse anonymously- Use web sites such as www.anonymizer.com or www.the-cloak.com
2. Disable cookies on your web browser
3. Use free e-mail addresses for information placed on web sites
4. Don’t divulge personal information to online strangers
5. Make sure registration forms have a privacy policy statement
What is encryption?
Encryption refers to the coding of information so that it is only readable by the intended recipient
A readable message is called plaintext
Encryption key is a formula used to make plaintext unreadable
Symmetric key encryption algorithms are encryption techniques that use the same key to encrypt and decrypt a message
Data Encryption Standard (DES) is a commonly used encryption system
What is public key encryption? Public key encryption uses two different keys
Public key is the encryption key Private key is the decryption key
Used in e-commerce transactions
Provides a secure channel for information
Computationally intensive or it places a heavy burden on the CPU
Vulnerable to cryptanalysis or code breaking
Key length is the length of an encryption key
What are public security issues involving encryption?
Encryption can be used for illegal means as well as legitimate means Encryption will devastate law enforcements ability to fight crime Public key encryption can also be used in telephone conversations Law enforcement agencies are asking for laws enabling them to eavesdrop on encrypted messages
HushmailEmail
Pretty Good Privacy
How can you protect your online privacy?
Surfing Anonymously
Anonymous Services
THE
END