Cyber law and password protection

13
Cyber Privacy and Password protection Cyber Privacy and Password protection Bavijesh Thaliyil M.Ed, Dept. of Education University of Kerala

Transcript of Cyber law and password protection

Page 1: Cyber law and password protection

Cyber Privacy and Password protectionCyber Privacy and

Password protectionBavijesh Thaliyil

M.Ed, Dept. of Education University of Kerala

Page 2: Cyber law and password protection

Cyber privacy is the privacy and security level of personal data published via the Internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences.

CCyber-Privacy is mostly defined by the services used by individuals. Whatever agreements individuals agree to when they sign up for a service usually signs away their right to privacy. In other cases the reasonable expectation of privacy is not reasonable if the behaviors or communications in question were knowingly exposed to public view.

Cyber Privacy – A PraludeCyber Privacy – A Pralude

Page 3: Cyber law and password protection

Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy

Cyber-Privacy is a huge concern for civilians and espeically for companies because of the potential for crime.

Such crimes include:

Malwaresuch as the use of malicious code which can compromise a user's identity and/or informaton

Denial of Service Attacks Block a user from accessing his or her information

Computer VirusesCan compromise user information as well as identity

All of these crimes fall under the category or fraud, identity theft, phishing scams and or information warfare.

Page 4: Cyber law and password protection

Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy

The Cyber-Privacy Project attempts to raise public awareness and promote the education of Cyber Privacy to prevent crimes from happening.

Privacy protection and cyber security should be thought of as interconnected: as more and more personal information is processed or stored online, privacy protection increasingly relies on effective cyber security implementation by organizations to secure personal data both when it is in transit and at rest.17 In some cases, cyber security measures underpin critical infrastructure that protects data, thereby safeguarding personal information

Page 5: Cyber law and password protection

Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy

Credit-card fraud

Data communications fraud

Piggyback on someone else’s networkOffice network for personal purposesComputer-directed diversion of funds Unauthorized access to computer files

Accessing confidential employee recordsTheft of trade secrets and product pricing Unlawful copying of copyrighted softwareCasual sharing of copyrighted softwareAssembly-line copying

Page 6: Cyber law and password protection

Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy

Bomb Program to trigger damage• Scheduled to run at a later date• May be found in software for general public, especially shareware

Data diddling• Changing data before or as it enters the system

Denial of service attack (DOS)• Hackers bombard a site with more request for service than it can

possible handle• Prevents legitimate users from accessing the site• Appearance of requests coming from many different sites simultaneously

Page 7: Cyber law and password protection

Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy

Piggybacking Original user does not sign off properly Intruder gains accesses to files via the original user id Salami technique Embezzlement

Scavenging

Search garbage and recycling bins for personal information

Page 8: Cyber law and password protection

Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy

Trapdoor

Illicit program left within a completed legitimate programPermits unauthorized and unknown entry to the program

Trojan horse

Illegal instructions placed inside a legitimate programProgram does something useful and destructive at the same time

ZappingSoftware to bypass security systems

Page 9: Cyber law and password protection

Crimes Security - ChallengesCrimes Security - Challenges

Social MediasSocial Medias Mobile Mobile TechnologyTechnology

Big DataBig Data

Page 10: Cyber law and password protection

Cyber Chellenges - ComplexityCyber Chellenges - Complexity

Complexity of the connected environment

Growing sophistication of the threat

Threats are moving to the mobile sphere

The “big data” paradox: is it a bigger risk or a solution?

For many, breach preparedness is still not a priority

Compliance vs risk-management

Page 11: Cyber law and password protection

Cyber Security – Policy DevelopmentCyber Security – Policy Development

Stewardship vs securitization

Cyberspace governance and security is a global issue

Page 12: Cyber law and password protection

ConclusionConclusion

As individuals grow more dependent on and connected to the cyberspace, they will become more reliant on organizations’ effective implementation of cyber security and sensitivity to privacy. The following are some of the key areas in which an increased emphasis on privacy protection could help support, advance and augment cyber security activities

Building privacy values into cyber security policy directions

Legislative approaches that incentivize cyber security preparedness

Facilitating broader dialogue on cyber security that acknowledges its importance for privacy, trust, and responsible data stewardship

Page 13: Cyber law and password protection