Online Privacy and Security
Online Privacy and Security
• Corporate networks
• Over half largest corporations were invaded
• Competitors?
• Government networks
• Dept of Defense attacked more than 200,000 times per
year
• Computer attack - abilities of other nations?
• Web sites
How Can Systems be Easily Compromised?
• Social engineering
• Con artist – persuade/manipulate a person to give away
their information like passwords, OTP over the phone
• What are they looking for?
• Take a close look at some of the 'secure' sites you log into.
• The questions seem pretty tough for an outsider looking into
trying to hack into your account.
• What's the name of your first pet?
• What is your maiden name?
• When was your mother/father born?
• Where were you born?
• Phishing – Send out bait to fool victims into giving away their
information
• Fake Websites – Molded to look like the real thing. Log in with real
credentials that are now compromised
What You Do
• Verify signature – software verifies scanned and
online signatures
Security Identification and Access
What You Are
• Biometrics – science of measuring individual
body characteristics
• Fingerprints
• Voice pattern
• Retina of the eye
• Entire face
Security Identification and Access
• How can you prevent?
• Internal controls
• Transaction log
• Auditor checks
• Who has accessed data during periods when that data
is not usually used?
• Off-the-shelf software to access the validity and
accuracy of the system’s operations and output
Security Identification and Access
• Secured waste
• Shredders
• Locked trash barrels
• Applicant screening
• Verify the facts on a resume
• Background checks
• Built-in software protection
• Record unauthorized access attempts
• User profile
Security The Internet
• Firewall
• Dedicated computer that
governs interaction
between internal network
and the Internet
• Encryption
• Data Encryption Standard
(DES)
Security – Protect Yourself
• Recognize inappropriate requests for information
• Take ownership for your online security
• Understand risk and impact of security breeches
• Social engineering attacks are personal
• Password management
• Two factor authentication
• Physical security
• Understand what information you are putting on the
Web for targeting at social network sites
Privacy
• Where is my data?
• How did they get my data?
• Who sees it?
• Is anything private anymore?
Monitoring software
• Screens
• E-mail
• Keystrokes per minute
• Length of breaks
• What computer files are used and for how long
Privacy groups want legislation requiring employers
to alert employees that they are being monitored.
Privacy: Monitoring by Web Sites
• Records:
• Country/State/City… address
• Site you just left
• Everything you do while on the site
• Hardware and software you use
• Click stream
• Series of clicks that link from site to site
• History of what the user chooses to view
Privacy: Monitoring by Web Sites
• Cookie
• Stores information about you
• Located on your hard drive or browser
• Beneficial uses
• Viewing preferences
• Online shopping
• Secure sites retain password in cookie
• Controversial use
• Tracking surfing habits for advertisers
• Can set browser to refuse cookies or warn before storing
• Software available to manage cookies (e.g. cookiebot, Osano)
Is there privacy anymore?
Policies world across on Data Protection
• General Data Protection Regulation (GDPR) - EU
• European Union regulation on information privacy in the European Union
and the European Economic Area.
• California Consumer Privacy Act (CCPA) - USA
• Comprehensive data privacy act gives Californian residents greater
transparency and control over how businesses collect and use their personal
information
• Digital Personal Data Protection Act (DPDP) - India
• Act to provide for the processing of digital personal data in a manner that
recognises both the right of individuals to protect their personal data