Mis - Privacy Issues
Mis - Privacy Issues
Mis - Privacy Issues
Privacy is . . .
the right to be left alone or as state or condition of limited access to a person. A classic definition describes privacy as the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.
Privacy Issues
1. 2. 3. 4. 5. 6. 7. Cookie proliferation Seizing cloud data E-mail Concerns Computer Matching Wireless privacy challenges Denial of service attacks Software vulnerability
Cookie Proliferation
The invisible cookie software agents that track your browsing habits and personal data. Advertising networks, marketers, and other data profiteers depend on cookies to learn more about who you are.
E-mail Concerns
Corporations and individuals are now using email as a major means of communication. Two types of threats : 1.Spamming 2.Flaming
Spamming Sending of unsolicited e-mail by mass advertisers. Used to spread computer viruses or infiltrate systems.
Flaming Sending of messages.
critical
and
vulgar
Computer Matching
Selling of information about customers from database to other parties. Consumers are then subjected to a barrage of unsolicited promotional material.
Software Vulnerability
Software errors also pose a constant threat to information systems. The problem is the presence of hidden bugs or program code defects .
Web-bugs
Which provides server capability to monitor the behaviour of the visitor. Web bugs are tiny graphic files inserted in e-mail messages and web pages , which monitor the visitor behaviour . These tiny files identify the visitor , and keep track of pages visited and transmit this information to website monitor computer.
IPSec (Ipv6)
IPSec provides security for transmission of sensitive information over unprotected networks. IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices ("peers") With IPSec, data can be transmitted across a public network without fear of observation, modification, or spoofing.
Cookies
The technology produces tiny files deposited on computer hard disk known as cookies. These cookies are designed to collect the data about the visitors and retain it for the future guidance.
Security Outsourcing
The main security function can be outsourced to managed security service providers (mssp). It monitor network activity and perform vulnerability testing and intrusion testing. GUARDENT, COUNTERPANE, VERISIGN are some mssps now available.
Access Control
These are the policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders
THANK YOU