lect 08 computer security and privacy 2 4 q
TRANSCRIPT
![Page 1: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/1.jpg)
1
Arab Academy for Science &Technology & Maritime Transport
College of Computing and Information Technology
![Page 2: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/2.jpg)
2
• Marke&ng database: Collec&on of data about people, used for marke&ng purposes • Data obtained through online and offline purchases, public informa&on, etc.
• Beginning to be used in conjunc&on with Web ac&vi&es • Government database: Collec&on of data about people, collected and maintained by the government • Tax informa&on, Social Security earnings, personal health records, marriage and divorce informa&on
• Some informa&on is confiden&al, other is public
![Page 3: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/3.jpg)
3
• Electronic profiling • Using electronic means to collect a variety of in-‐depth informa&on about an individual
![Page 4: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/4.jpg)
4
![Page 5: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/5.jpg)
5
![Page 6: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/6.jpg)
6
• Safeguard your e-‐mail address
• Use a throw-‐away e-‐mail address (an extra e-‐mail address that you can use for ac&vi&es that might result in spam) • Get a second e-‐mail address from your ISP or from Hotmail, Yahoo! Mail, or Gmail
• Can stop using it and get a new one when needed
![Page 7: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/7.jpg)
7
• Be cau&ous of revealing personal informa&on • Read a Web site’s privacy policy
• Can use privacy soSware, such as the free Privacy Bird program
• Do not supply personal informa&on to people in chat rooms
![Page 8: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/8.jpg)
8
![Page 9: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/9.jpg)
9
An anonymizer or an anonymous proxy is a tool that aUempts to make ac&vity on the untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protec&ng personal informa&on by hiding the client computer's iden&fying informa&on
![Page 10: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/10.jpg)
10
• Be cau&ous of revealing personal informa&on • Read a Web site’s privacy policy
• Avoid puWng too many personal details on your Web site
• Be wary of sites offering prizes in exchange for personal informa&on
• Consider using privacy soSware, such as anonymous surfing
• Supply only the required informa&on in registra&on forms
• Delete your browsing history and e-‐mail seWngs when using a public computer
![Page 11: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/11.jpg)
11
• Use an e-‐mail filter to automa&cally route possible spam into a special folder to deal with later
![Page 12: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/12.jpg)
12
• Web servers holding sensi&ve data should be secured
• Only enter personal informa&on on Web sites using secure servers
• Automa&c encryp&on systems for e-‐mail can help sensi&ve data from accidentally being revealed
![Page 13: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/13.jpg)
13
• Properly dispose of hardware and outdated data • Wipe (not just delete) data on hard drives before disposing of a computer or hard drive
• Storage media containing sensi&ve data should be shredded
• Businesses should have a media sanita&on/data destruc&on policy
![Page 14: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/14.jpg)
14
![Page 15: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/15.jpg)
15
![Page 16: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/16.jpg)
16
![Page 17: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/17.jpg)
17
![Page 18: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/18.jpg)
18
![Page 19: Lect 08 computer security and privacy 2 4 q](https://reader033.vdocuments.mx/reader033/viewer/2022052906/558d1648d8b42a02418b45a8/html5/thumbnails/19.jpg)
19
• Difficult for legal system to keep pace with technology
• Difficult to balance freedom of speech with privacy