Cyber Privacy and Password protectionCyber Privacy and
Password protectionBavijesh Thaliyil
M.Ed, Dept. of Education University of Kerala
Cyber privacy is the privacy and security level of personal data published via the Internet. It is a broad term that refers to a variety of factors, techniques and technologies used to protect sensitive and private data, communications, and preferences.
CCyber-Privacy is mostly defined by the services used by individuals. Whatever agreements individuals agree to when they sign up for a service usually signs away their right to privacy. In other cases the reasonable expectation of privacy is not reasonable if the behaviors or communications in question were knowingly exposed to public view.
“
”
Cyber Privacy – A PraludeCyber Privacy – A Pralude
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Cyber-Privacy is a huge concern for civilians and espeically for companies because of the potential for crime.
Such crimes include:
Malwaresuch as the use of malicious code which can compromise a user's identity and/or informaton
Denial of Service Attacks Block a user from accessing his or her information
Computer VirusesCan compromise user information as well as identity
All of these crimes fall under the category or fraud, identity theft, phishing scams and or information warfare.
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
The Cyber-Privacy Project attempts to raise public awareness and promote the education of Cyber Privacy to prevent crimes from happening.
Privacy protection and cyber security should be thought of as interconnected: as more and more personal information is processed or stored online, privacy protection increasingly relies on effective cyber security implementation by organizations to secure personal data both when it is in transit and at rest.17 In some cases, cyber security measures underpin critical infrastructure that protects data, thereby safeguarding personal information
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Credit-card fraud
Data communications fraud
Piggyback on someone else’s networkOffice network for personal purposesComputer-directed diversion of funds Unauthorized access to computer files
Accessing confidential employee recordsTheft of trade secrets and product pricing Unlawful copying of copyrighted softwareCasual sharing of copyrighted softwareAssembly-line copying
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Bomb Program to trigger damage• Scheduled to run at a later date• May be found in software for general public, especially shareware
Data diddling• Changing data before or as it enters the system
Denial of service attack (DOS)• Hackers bombard a site with more request for service than it can
possible handle• Prevents legitimate users from accessing the site• Appearance of requests coming from many different sites simultaneously
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Piggybacking Original user does not sign off properly Intruder gains accesses to files via the original user id Salami technique Embezzlement
Scavenging
Search garbage and recycling bins for personal information
Crimes involves in Cyber PrivacyCrimes involves in Cyber Privacy
Trapdoor
Illicit program left within a completed legitimate programPermits unauthorized and unknown entry to the program
Trojan horse
Illegal instructions placed inside a legitimate programProgram does something useful and destructive at the same time
ZappingSoftware to bypass security systems
Crimes Security - ChallengesCrimes Security - Challenges
Social MediasSocial Medias Mobile Mobile TechnologyTechnology
Big DataBig Data
Cyber Chellenges - ComplexityCyber Chellenges - Complexity
Complexity of the connected environment
Growing sophistication of the threat
Threats are moving to the mobile sphere
The “big data” paradox: is it a bigger risk or a solution?
For many, breach preparedness is still not a priority
Compliance vs risk-management
Cyber Security – Policy DevelopmentCyber Security – Policy Development
Stewardship vs securitization
Cyberspace governance and security is a global issue
ConclusionConclusion
As individuals grow more dependent on and connected to the cyberspace, they will become more reliant on organizations’ effective implementation of cyber security and sensitivity to privacy. The following are some of the key areas in which an increased emphasis on privacy protection could help support, advance and augment cyber security activities
Building privacy values into cyber security policy directions
Legislative approaches that incentivize cyber security preparedness
Facilitating broader dialogue on cyber security that acknowledges its importance for privacy, trust, and responsible data stewardship
Top Related