32
Tech Topic: Privacy By: David Chait, Steven Gonzalez, Travis Lopez, Kristen Magno, Steven Osaki

Tech Topic Privacy

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Tech Topic Privacy

Tech Topic: Privacy

By: David Chait, Steven Gonzalez, Travis Lopez, Kristen Magno, Steven Osaki

Page 2: Tech Topic Privacy

What is Computer Privacy?

The ability to control what information one reveals about

oneself, and to control who can access that information.

Page 3: Tech Topic Privacy

Summary

• History and cases of privacy• Current legislation• Future potential concerns and threats• Tips on how to protect yourself

Page 4: Tech Topic Privacy

DIGITAL U: A Loss of Privacy? http://www.youtube.com/watch?v=W31Xy2wp7wc

VIDEO

Page 5: Tech Topic Privacy

Whose privacy is at risk?

Page 6: Tech Topic Privacy

Everyone Is At Risk

• Applicants• Students• Individuals Engaged with Large Firms• The Unsuspecting Public

Page 7: Tech Topic Privacy

Applicants

• Harvard’s student database was hacked exposing over 10,000 applicants from 2007

• This information was placed on Bittorrent

Page 8: Tech Topic Privacy

Students• Our information has been

made widely available within our own institutions, and at times is vulnerable to loss.

• University of Texas at Austin – McCombs School of Business was compromised on April 24, 2006 placing 197,000 people at risk

• In May of 2006, the Texas Student Loan Corporation lost the records of 1.7 million borrowers.

Page 9: Tech Topic Privacy

Individuals Engaged with Large Firms

• Stanford suffers a theft of 72,000 records relating to employees hired prior to September of 2007.

• Ernst and Young loses a laptop containing thousands of IBM employee Records

• On May 22,2006 The Department of Veterans Affairs reports the theft of 28,600,000 records (All vets discharged between 1975 and 2006). o The information was stolen from an employee’s

home computero A federal Judge has ordered restitution over 20

million dollars due to this attack

Page 10: Tech Topic Privacy

The Unsuspecting Public

• Data Aggregation - The warehousing, repackaging, and resale of information about us.

• ChoicePoint loses information about 145,000 individuals with which it has no business relationship.

Page 11: Tech Topic Privacy

Legislation & Beyond

Page 12: Tech Topic Privacy

Key Legislation

• Patriot Act• Foreign Intelligence

Surveillance Act (FISA)

• Real ID Act - The Creation of a National ID Card. 

Page 13: Tech Topic Privacy

Surveillance Technology    

• ECHELON • Used by the United States National Security Agency (NSA)

to intercept and process international communications through satellites

• System is able to intercept messages over the internet messages over the internet

• System can also use orbiting satellites to monitor signals anywhere on the earth’s surface

• MAIN PURPOSE: to extract information and intelligence illicitly from millions of messages every day, across the globe

• NSA and allies have worked to limit/prevent privacy of international telecommunications

• The Echelon system has abilities to eavesdrop on everyday communications and to watch everything that is being said and done in the world

Page 14: Tech Topic Privacy

Advertising Technologies

Technologies • Cookies• Pixels• Web Bugs• Spyware

Implications• Building Profiles of everyone. • Understanding everyone's

interests.• Tracking your movement all

around the web.  • Overall...knowing what you do,

when you do it, what you like, who you know, and what your opinion is on certain topics is very sensitive information. 

Page 15: Tech Topic Privacy

Privacy / Civil Liberty Organizations

• Electronic Frontier Foundation (EFF.org)

• American Civil Liberties Union (ACLU)

• Electronic Privacy Information Center (EPIC)

• Privacy Coalition   Advice: Be aware of the services you use and the data

you provide to each of them. Be informed of the latest privacy battles happening in the media and understand that everything you do online is archived forever! 

Page 16: Tech Topic Privacy

Potential Concerns and Threats

Page 17: Tech Topic Privacy

Threats : Spam

• Abuse of electronic messaging systems to send unsolicited messages constantly

• Mostly found in your emails

Page 18: Tech Topic Privacy

Spyware

• A type of malware that is installed on computers and collects little bits of information at the time about users without their knowledge

Page 19: Tech Topic Privacy

Malware

• Software designed to infiltrate a computer system without the owner’s informed consent

• It includes worms, trojans, and rootkits

• Make sure you computer has protection

Page 20: Tech Topic Privacy

Hackers

• A person who breaks into computers usually by gaining access to administrative controls

• Beware, they are out there

Page 21: Tech Topic Privacy

Identity Theft

• Fraud that involves someone pretending to be someone else in order to steal money or get other benefits.

• Anytime you put your credit card number or any other personal information out on the web, its capable of being stolen.

Page 22: Tech Topic Privacy

Phishing

http://www.youtube.com/watch?v=sqRZGhiHGxg

Page 23: Tech Topic Privacy

Phishing Scams http://www.youtube.com/watch?v=sqRZGhiHGxg

VIDEO

Page 24: Tech Topic Privacy

Certain ways your privacy is viewed

• Cookies, which has been around for awhile.

• Facebook, Twitter, and Myspace are websites where people in our society today post personal information about themselves, which can be viewed by anyone including employers.

Page 25: Tech Topic Privacy

Tips on How to Protect Yourself

Page 26: Tech Topic Privacy

Software

• Anti-virus (AVG)• Anti-spyware (Lavasoft

Ad-aware)• Firewall (ZoneAlarm)• P2P (PeerBlock)

• http://epic.org/privacy/tools.html

Page 27: Tech Topic Privacy

The Browser

• Security/Privacy Add-ons (Cookie Management)

• Website Security– HTTPS and Padlock– Privacy Policies– Privacy Seals (TRUSTe)

Page 28: Tech Topic Privacy

Protecting your E-mail

• Use different e-mails for different web activities.

• Free webmail services (Hushmail, Mailvault, S-mail)

• Pretty Good Privacy (PGP)

Page 29: Tech Topic Privacy

Browsing the Internet

• TOR, The Onion Router, Sponsored by the Electronics Frontier Foundation.

• Anonymizer browsing services

• tor.eff.org• www.anonymizer.co

m

• Yahoo – 90 Days• Google – 9 Months• Microsoft – 18

Months

Page 30: Tech Topic Privacy

Summary

• History and cases of privacy• Current legislation• Future potential concerns and threats• Tips on how to protect yourself

Page 31: Tech Topic Privacy

http://www.youtube.com/watch?v=R7yfV6RzE30

VIDEO

Page 32: Tech Topic Privacy

WORKS CITED LIST• www.idsafe.us• http://news.cnet.com/8301-10789_3-9893174-57.html• http://www.computerworld.com/s/article/110813/Breach_at_Univ._of_

Texas_Austin_exposes_data_on_197_000_people• http://www.consumeraffairs.com/news04/2006/06/student_loan_loss.

html• http://www.securitymanagement.com/news/stanford-university-lapto

p-stolen-72-000-risk-identity-theft• http://www.theregister.co.uk/2006/03/15/ernstyoung_ibm_laptop/• http://www.networkworld.com/news/2006/060606-active-duty-troop-i

nformation-part-of.html?nwwpkg=slideshows• http://www.msnbc.msn.com/id/6979897/