17
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.

Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Embed Size (px)

Citation preview

Page 1: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Privacy in computing

Material/text on the slides from Chapter 10

Textbook: Pfleeger.

Page 2: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

What is privacy?

• How would you define it?

• What do you think its aspects are? – Three key aspects:

• Controlled disclosure.

• Sensitive data

• Affected subject.

Page 3: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Computer Related Privacy Problems

• Data collection: what issue do you see?

• No informed consent: – Examples: real age.

• Loss of control: class discussion. – Example: posting on a blog.

• What are the ramifications vs. writing a letter?

• Ownership of data.

Page 4: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Computer Related Privacy Problems

• Data collection: what issue do you see?

• No informed consent: – Examples: real age.

• Loss of control: class discussion. – Example: posting on a blog.

• What are the ramifications vs. writing a letter?

• Ownership of data.

Page 5: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Protections provided

• Privacy Policies;– First step: fair information policies:

• Regulate these;– Collection of information.

– Data quality.

– Purpose specification (use of information)

– Use limitation.

– Security safeguards.

– Openness.

– Individual participation.

– Accountability.

Page 6: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

U.S privacy laws

– Are usually applied to individual data types:

– HIPAA

– Financial organizations: Gramm-Leach-Bliley Act (GLBA)

– Important in Radford: Federal Educational Rights and Privacy Act (FERPA).

• Somethings are not clear: example class discussion.

Page 7: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

U.S govt. websites.

• Privacy laws controlled by the FTC. • Address 5 factors:

– Notice (must be informed)

– Choice

– Access (contest accuracy of data collected)

– Security. (data collectors must secure against unauthorized use).

– Enforcement (sanctions on noncompliance)

• In 2002, the US e-government act.

Page 8: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

What about commercial websites?

• Federal trade comission can prosecute for deceptive practices. (e.g., false advertising)

– E.g., JetBlue and the DOD.

Page 9: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Other issues with Privacy.

• Anonymity. – Issues with anonymity.

• Multiple identities (online id)

Page 10: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

How to protect against privacy loss?

Page 11: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

How to protect against privacy loss?

• Get/give as little data as possible.

• Data anonymization.

• Audit trail: record who has accessed what data.

• Security and controlled access

• Training, quality, Restricted usage, data left in place.

• Policy.

Page 12: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Issues in Computer Security: Data mining and privacy.

• Government data mining. • Privacy preserving data mining:

– Data mining is “extracting hidden patterns from large amounts of data”

– Solutions to preserve privacy:• Remove id information. Doesn’t work.

– E.g., Sweeney’s report: > 87% US population can be identified by: 5 digit zip code, gender and date of birth.

• Data perturbation. Example. Needs to be done carefully.

Page 13: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Privacy on the web

• Think about this: – On the web: every word you speak (blog) can

be read – Someone selling something may have ads on

their site for something else. – Identity of the other person may not be known!

• Some issues on the web are protected.– Can you name them?

Page 14: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Privacy on the web

• Credit card payments are protected. – But not necessarily private.

– Paypal etc.. May solve the privacy issues.

• Site and portal registrations: – Beware of “we will enhance your browsing experience”

– Using email as id on some sites. Issues?

• Third party ads.

• Contests and offers: Free Iphones!

Page 15: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Privacy issues

• Cookies: – Be-aware

• Third party cookies. E.g., Double Click and online profiling.

• Adware

• Web-bug.

• Spyware: keystroke loggers.

Page 16: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Email security

• Interception of email. – Can be encrypted using PGP or S/MIME

– Email monitored legallly.

• Anonymous E-mail and remailers– Sending anonymous emails.

• Spoofing and spamming.

Page 17: Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger

Impact on Emerging technologies

• RFID tags– RFID and privacy issues:

• Consumer products. How can this be exploited?

– RFID in individuals.

• Electronic voting– Privacy issues.

• VoIP and Skype– Privacy issues.