How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet...

18
Privacy How It Applies In A Virtual World

Transcript of How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet...

Page 1: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

PrivacyHow It Applies In A Virtual World

Page 2: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

IntroductionGot cookies?

Internet explorerWhat is internet Privacy?

How secure your computer, files, and information is on the world wide web

The Pros and ConsUser personalization versus user violation

How can it be violated?Through media (google street view), phishing,

cookiesTaking Precautions

Page 3: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

Definition-Malware that can collect information about computer users without their knowledge. It can often hinder a computer’s performance.

Many anti-virus programs now have anti-spyware features.

Spyware

Page 4: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

How does it occur? People can install them without meaning to

as spyware is often installed with other programs.

There are two ways of doing this:Piggybacking on a desirable piece of softwareTrojan horse method i.e tricking the user into

downloading it.Can infect through security holes in internet

Page 5: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

Effects of SpywareCan hinder a computer’s functionalitySystem becomes slowCan disable firewall and ant-virus programs

Page 6: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

PhishingDefinition: n. To request confidential information over the Internet under false pretenses in order to fraudulently obtain credit card numbers, passwords, or other personal data.

Page 7: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

The term originated in the mid 1990s in connection with AOL

Phishing is usually done through fake emails or through instant messaging.

The user is prompted to provide important information about bank accounts or credit card numbers through emails and sites that look legitimate, but are actually fake. Their information can then be used to commit identity theft.

What is Phishing? When Did it Start?

Page 8: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

Is It Illegal?It is illegal to commit

Identity theft.It is not illegal to ask the

user to volunteer their personal information.

It is not illegal to send you an important looking message in order to prompt the user into volunteering the desired information.

Therefore phishing is only illegal once the information is used to commit identity theft.

Page 9: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

How Does This Affect The Common User?How can you spot a phishing scam?

Anyone can fall victim to phishing, so every internet user must use caution when volunteering private information.

Make sure that your connection is secure.

Signs that an email or site is not authentic: Misspelled domain names (ex.

www.yohoo.com) It has variations of domains as

well (ex. www.yahoo-security.net)

Don’t trust an email that leads you to a website that only shows an IP address (IP address ex. 102.199.60.250.)

Page 10: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

What are cookies?Cookies are text files stored on one’s computer after visiting a website

Used for: -Storing information such as a unique visitor ID-Allowing customization of a webpage, such that it can save information for the computer the person is currently using.

Page 11: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

Problems with CookiesThe information from cookies can be accessed by the website, which can then sell your information to others, allowing for ‘targeted’ ads

Based on the ‘profile’ built up by visiting certain websites or by one’s search history, ads will attempt to be tailored to one’s perceived interests

Page 12: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

VerdictCookies are, for the most part, harmless

Delete your cookies once in a while – some have expiration dates years in the future, and may persist indefinitely

In addition, there exist many different pieces of software for those who might want to manage their cookies and maintain their privacy

Page 13: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.
Page 14: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

What is this?

•360 degree views from visual perspectives of the street•Online access to ANYONE!

Page 15: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

Why it violates one’s privacy?•Gives real pictures of places.•Where you live•Where you work•Schools•Public security

Page 16: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

What can one do?•Nothing really…. Sorry•Attempt to sue? (has happened, didn’t work)

Page 17: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

What does this all mean?There are many ways for people to invade

privacy through computers not just limited to spyware, phishing, cookies, and Google street view.

In this computer filled world, people continuously find ways to get access to private information.

While some of these activities are illegal, not everyone is caught. It is important for people to be aware of strategies used to collect personal information.

Page 18: How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.

It is important for people to take precautions so their private information is protected. No one wants their passwords or credit card numbers stolen.Only give sensitive information to

authenticated and secure websites. Always validate websites or emails.

Run anti-virus/anti-spyware programs to ensure that your information is not being collected.

Just in case, you can delete cookies.Make sure that your internet connection is

secure and install a firewall.Keep up to date on computer news and how to

protect yourself.