Personal Privacy and Security

18
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski, May 2012 1

description

Personal Privacy and Security. Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University. Introduction. Internet: Good or Bad? Privacy/Security Issues Victims? What victims? Scams: How hard are they to spot? Scams: FBI/NW3C. Which ones have you heard of? - PowerPoint PPT Presentation

Transcript of Personal Privacy and Security

Page 1: Personal Privacy and Security

Personal Privacy and Security

Zenia C. Bahorski Ph.D.Department of Computer Science

Eastern Michigan University

Personal Privacy & Security - Z. Bahorski, May 2012 1

Page 2: Personal Privacy and Security

Introduction• Internet: Good or Bad?• Privacy/Security Issues• Victims? What victims?• Scams: How hard are they to spot?• Scams: FBI/NW3C. Which ones have you heard

of?• Privacy Threats• Tips to protect yourself• Security Threats• Tips to protect your computer

Personal Privacy & Security - Z. Bahorski, May 2012 2

Page 3: Personal Privacy and Security

Internet: Good or Bad?

• “Good” uses of the Internet

• “Bad” uses of the Internet

Personal Privacy & Security - Z. Bahorski, May 2012 3

Page 4: Personal Privacy and Security

Personal Privacy & Security - Z. Bahorski, May 2012 4

Where the hackers are from!Trustwave Global Security Report 2012.pdf

Page 5: Personal Privacy and Security

Internet: Good or Bad?

Should we keep it anyway?

Quote:

http://www.coursesmart.com/9780136008859/chap01#

Personal Privacy & Security - Z. Bahorski, May 2012 5

Page 6: Personal Privacy and Security

Privacy/Security Issues:

• What’s in a name?– Names with Positive connotations– Names with Negative connotations

Personal Privacy & Security - Z. Bahorski, May 2012 6

Page 7: Personal Privacy and Security

Privacy/Security Issues:

• How can people find information about us?

Personal Privacy & Security - Z. Bahorski, May 2012 7

Page 8: Personal Privacy and Security

• Can we really remain anonymous when we use the Web?– How much can a web site tell about you and your

computer just by you connecting to their web site?• Go to: http://cyscape.com/showbrow.asp?bhcp=1

• To whom is it advantageous to gather information about you?– Go to: http://www.spokeo.com

Personal Privacy & Security - Z. Bahorski, May 2012 8

Privacy/Security Issues:

Page 9: Personal Privacy and Security

Privacy/Security Issues:

• Computers NEVER forget!– Sign in to Google or Gmail– In location box, type in:• http://www.google.com/history

–Why DOES Google keep track of • Key words in Gmail• Search phrases

Personal Privacy & Security - Z. Bahorski, May 2012 9

Page 10: Personal Privacy and Security

Victims? What victims?

• According to the United States Census:– there are now 313,310,928 million people in the

United States with over 7 billion in the world (USCB, 2012).

– The Federal Trade Commission (FTC) estimates that, “as many as 9 million Americans have their identities stolen each year” (FTC, n.d.).

– That is almost 3 percent of the American population!

Personal Privacy & Security - Z. Bahorski, May 2012 10

Page 11: Personal Privacy and Security

Victims? What victims?

• Identity theft– Using another person’s name, personal identification

(driver’s license number, social security number), credit card, or banking information for personal gain• Taking advantage of credit history to:*

– Buy a car (turn around quickly at an auction house)– Buy a house

• Taking advantage of credit card or banking info:– Get cash– Open and pay for a cell phone account– Buy goods or services

• Get government documents – for their new identity!Personal Privacy & Security - Z. Bahorski,

May 2012 11

Page 12: Personal Privacy and Security

Victims? What victims?Identity theft – What to do if you are a victim:

– Keep a DETAILED log including dates, times, names and numbers called.

Do these 4 things:1.Call or go online and place a fraud alert:

– TransUnion: 1-800-680-7289; www.transunion.com;– Equifax: 1-800-525-6285; www.equifax.com;– Experian: 1-888-EXPERIAN (397-3742); www.experian.com;

2.Close the accounts that have been compromised.3.File a complaint with the FTC to help police track like-thefts.4.File a police report (give them a copy of your FTC complaint to add to the police report).From the FTC at: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html Personal Privacy & Security - Z. Bahorski,

May 2012 12

Page 13: Personal Privacy and Security

Privacy Threats

• Surveillance:– Cameras

• Look up! Cameras are “everywhere” (public places and in private places where posted) Look for these! You’ll be amazed!

• Case: Don’t take pictures in private places– Cookies

• For an explanation of cookies, go to:• http://www.cookiecentral.com/n_cookie_faq.htm#what_are

– Spying on Cell Phones: go to http://www.mobilespytool.com/

Personal Privacy & Security - Z. Bahorski, May 2012 13

Page 14: Personal Privacy and Security

Privacy Threats

• Surveillance cont…– Keyloggers

• Record keys pressed on keyboard: Hardware or Software (easy to do, directions are available on the Internet!)

• How to Add a keylogger: http://www.youtube.com/watch?v=0X9kNpOJiNQ

– Is “FREE” Internet really “free”? • Be careful of fake wi-fi

– Just how much surveillance is allowed in the workplace?• Go to: http://www.youtube.com/watch?v=lO3wuYiITiE

Personal Privacy & Security - Z. Bahorski, May 2012 14

Page 15: Personal Privacy and Security

Tips to Protect Yourself!

Personal Privacy & Security - Z. Bahorski, May 2012 15

Page 16: Personal Privacy and Security

Tips to Protect Yourself!• Protecting yourself online:– (my 6th): Do not reply to an email to “unsubscribe”!– (my 7th): NEVER post anything online that you don’t

want posted on a billboard on I-94! • Includes: Personal information, pictures, poetry,

reports (papers), etc.• Facebook (and their “partners”) can USE any picture

that you post for any reason. • ANY employer (current or future) can view anything

you post onto Facebook. (Don’t think that only your friends can see your stuff.) They can pay for this.

– (my 8th): Don’t use information (such as pet names) as passwords if you include that info online.

Personal Privacy & Security - Z. Bahorski, May 2012 16

Page 17: Personal Privacy and Security

Tips to Protect Your Computer!• Protecting your computer:– Tips to help you protect your computer from viruses

and spyware:1. Keep your Operating System updated (don’t ignore

updates!)2. Install a firewall3. Install antivirus software (2 if you can)4. Do not open attachments from unknown sources5. Do not run programs that you’ve downloaded from online

unless you check it for viruses first! 6. Do not download from unknown sites.7. Do not click on ads8. DO surf wisely! Is the site REALLY worth the RISK?

Personal Privacy & Security - Z. Bahorski, May 2012 17

Page 18: Personal Privacy and Security

Contact Information

• Zenia C. Bahorski Ph.D.• 511 Pray-Harrold Hall• Department of Computer Science• Eastern Michigan University

• Email: [email protected]• Web page: people.emich.edu/zbahorski• Images: Microsoft Clipart

Personal Privacy & Security - Z. Bahorski, May 2012 18