3-5onlineservicesandsecurityandprivacyofdata

26
3.5 Online Services and Security and Privacy of Data

Upload: kabby-groovyy

Post on 27-Sep-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

2.4 Use of ICT in Teaching and Learning

Shop SecurityThere are two types of encryption keys:Public encryption keyPrivate encryption keyPeople have a public encryption key they can tell everyone about. And they have a private encryption key, which only they know about.So what?Back to ContentsResponsibility for passing on informationWhen a company passes on information about any individual they must ensure that the least amount of information that could identify the individual is used.Things like online banking or online shopping require you to give them your personal information. It MUST be ensured that information is not passed from organisation to organisation without authorisation from the individual.

Back to Social/ Ethical ImplicationsBack to ContentsAnonymised InformationThis is when information about an individual is passed on without the mention of their name.Companies should always omit any personal details wherever possible.Back to Social/ Ethical ImplicationsBack to ContentsAggregated InformationIt is a summary of personal information without naming the person.For example:All the people who are above the age of 60 and have diabetes.This way no one can be identified.However, there is a downside to this. There might be only one person in the whole hospital so identification of the person will be easy and may be embarrassing for the individual.

Back to Social/ Ethical ImplicationsBack to ContentsBreaches of ConfidenceThis is basically a non-disclosure agreement.All employment contracts should have a duty of confidence clause.

Back to Social/ Ethical ImplicationsBack to ContentsNeed for SecurityAll organisations need to protect they computerized information.Many people dont use online banking because they are scared that people will defraud them.

Back to Social/ Ethical ImplicationsBack to ContentsIdentity TheftIt starts off by stolen credit card details.So when does it all go wrong?Scenario: Purchase is made at a restaurant; the customer lets the waiter take their credit card out of their sight. The card is then skimmed on a special reader and all the details from the card are copied from the card.A less obvious way would be

Back to Social/ Ethical ImplicationsBack to Contents21PhishingThis is when a fraudulent email is sent to a person. It will seem as if the email is sent by the bank however in reality it isnt. The email will request the person to give their password, card or account number and other security details.What is pharming?What the phishers do is that they include the website address for the customer to go on to. And this website looks legit. This fake website is set up PURELY to get customer details.

Back to Social/ Ethical ImplicationsBack to ContentsSpywareThis is a software that customers unknowingly download. It usually is attached to a software which the computer user downloads.The fraudster has attached spyware to gather personal details of the user.They do this by using a key logging software when the user logs on to their bank account of online shopping.

Back to Social/ Ethical ImplicationsBack to ContentsOnline Auction or Shopping FraudThis is when somebody sets up a genuine site and puts up expensive items for sale and then they dont deliver it or they send a cheap imitation. They take the money but never deliver the goods.

Back to Social/ Ethical ImplicationsBack to Contents