module 5: anonymity, security, privacy and civil liberties
DESCRIPTION
Module 5: Anonymity, Security, Privacy and Civil Liberties. Introduction Anonymity Security Privacy Ethical and Social Issues. Introduction. Information has increased in value The demand for information is high due to: High digitalization of information and increasing bandwidth. - PowerPoint PPT PresentationTRANSCRIPT
Module 5: Anonymity, Module 5: Anonymity, Security, Privacy and Civil Security, Privacy and Civil LibertiesLibertiesIntroductionAnonymitySecurityPrivacyEthical and Social Issues
Ethical and Social...J.M.Kizza 1
IntroductionIntroduction
Information has increased in valueThe demand for information is high due to:
1. High digitalization of information and increasing bandwidth.
2. Declining costs of digital communication.3. Increased miniaturization of portable
computers and other communications equipment.
4. Greater public awareness by the news media of the potential abuse of digital communication, especially the Internet.
The danger for misuse is real
Ethical and Social...J.M.Kizza 2
AnonymityAnonymity
Absence of identityThere are two types of identity:
1. Pseudo2. Untraceable
Anonymity on the Internet◦ Email◦ Other postings
Ethical and Social...J.M.Kizza 3
SecuritySecurity Means to prevent unauthorized accessConsists of:
1. Confidentiality - to prevent unauthorized disclosure of information to third parties.
2. Integrity - to prevent unauthorized modification of files and maintain the status quo
3. Availability -: to prevent unauthorized withholding of information from those who need it when they need it.
Ethical and Social...J.M.Kizza 4
SecuritySecurity…… Perimeter security
◦ Fence◦ Dog◦ Guards
Firewalls1.Proxy - individual client requests conform
to the pre-set conditions, then the firewall acts on the request
2.Filter -these are packet-level filters 3.Stateful Inspection: These firewalls
combine the filter and proxy functionalities.
Passwords
Ethical and Social...J.M.Kizza 5
Information SecurityInformation SecurityEncryption
◦ Plaintext◦ Ciphertext◦ Types:
1. Symmetric (fig 5.1) 2. Asymmetric (fig 5.2)Encryption standards RSA DES PEMS PGP
Authentication (fig 5.3)
Ethical and Social...J.M.Kizza 6
Privacy Privacy
Human value consists of:◦Right to control external influences on
individual information:1. Solitude - right to be alone2. Anonymity – right to have no public identity3. Intimacy – right not to be monitored
1.Right to control personal information: Reserve – right to control one’s information
Ethical and Social...J.M.Kizza 7
Information Gathering, Information Gathering, Databases, and PrivacyDatabases, and Privacy
Who has your name on a list and what they're doing with it?
1. companies you have done business with. 2. Individuals3. Government agencies
protect the customer through three requirements that the institutions must disclose to us:
1. Privacy Policy: through which the institution is bound to tell us the types of information the institution collects and has about us and how it uses that information.
2. Right to Opt-Out: through which the institution is bound to explain our recourse to prevent the transfer of our data to third party beneficiaries.
3. Safeguards: through which the institution must put in place policies to prevent fraudulent access to confidential financial information.
Ethical and Social...J.M.Kizza 8
Ethical and Social IssuesEthical and Social IssuesThe ethics of privacy - with the
advent of the Internet and electronic messages, confidentiality is a great concern. Computer technology has raised more privacy questions than it has found answers to
The ethics of security - the Internet is an insecure communications channel when it is used by a criminal.
Ethical and Social...J.M.Kizza 9