1 / 54

Privacy in the Cybernet

Privacy in the Cybernet. B95705037 佘亭維 B95705061 江昱其 B95705014 王郁婷. Agenda. Privacy in the Cybernet Categories of privacy in the cybernet How we reveal our information? Cookies. What is Privacy in the cybernet?. Privacy Traditional v.s Modern. Categories of privacy in the cybernet.

gwylan
Download Presentation

Privacy in the Cybernet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy in the Cybernet B95705037佘亭維 B95705061江昱其 B95705014王郁婷

  2. Agenda • Privacy in the Cybernet • Categories of privacy in the cybernet • How we reveal our information? • Cookies

  3. What is Privacy in the cybernet? • Privacy • Traditional v.s Modern

  4. Categories of privacy in the cybernet • Privacy of a Person's Persona • Privacy of Data about a Person • Privacy of a Person's Communication

  5. Privacy of a Person's Persona • Live Show • Web monitor • Kindercam

  6. Privacy of Data about a Person • What’s data about a person • SPAM

  7. Privacy of a Person's Communication • Sniffer • peek the e-mail

  8. Cookies • Cookies=Foods? • Cookies are pieces of information sent by a Web server to a user’s browser.

  9. How we reveal our information? • Signing up for Internet

  10. How we reveal our information? • E-mail and list-serves • Browsing the Internet • Interactive use : Instant messages and social networks

  11. How we reveal our information? • Personal web sites and blogs

  12. How we reveal our information? • Managing your financial accounts and online bill payment

  13. References • http://www.cyberlawyer.com.tw/alan4.html • http://www.privacyrights.org/fs/fs18-cyb.htm • http://www.privacy.gov.au/internet/internet_privacy/

  14. Privacy in the Cybernet B95705037佘亭維 B95705061江昱其 B95705014王郁婷

  15. Agenda • Spyware • Phishing • Website introduction

  16. What is Spyware? • It is a computer software that collects personal information about users without their informed consent.

  17. Categories of Spyware • 間諜程式 • 廣告軟體 • 惡意撥號程式 • 惡作劇程式 • 駭客工具 • 遠端存取工具 • 密碼破解應用程式

  18. Where is Spyware? • Pop-up Advertisement • Screensaver

  19. Where is Spyware? • Games downloaded • Music downloaded

  20. Spyware prevention • Don’t reply any Ad-mail,spam, pop-up advertisement • Use other browsers, ex:Firefox • Install Anti-virus, ex:Spy Sweeper, Ad-Aware

  21. Phishing • phreak +fishing=phishing • Target:Economic website • Citibank,eBay,U.S. Bank,Paypal • Anti-phishing

  22. Phishing Approaches • Spam • MSN (Instant message) • Others

  23. HTTPS=HTTP+SSL

  24. APWG • Anti-Phishing Working Group

  25. MingPian.com • 傳一張換兩張 • 總裁級人物資訊

  26. MingPian.com

  27. References • http://www.antiphishing.org/ • http://cpro.com.tw/ • http://www.informationsecurity.com.tw/ • http://taiwan.cnet.com/ • http://www.mingpian.com/ • http://www.ucloo.com/

  28. Privacy in the Cybernet B95705037佘亭維 B95705061江昱其 B95705014王郁婷

  29. Agenda • Sniffing • Metadata in JPEG files • Key logger • Conclusion

  30. Sniffing • Telephone vs Internet • Web manager • Military • Sniffer software: Instant message sniffers

  31. Sniffing Prevention • 以 arp 指令查看 arp table 資訊 • 聊天軟體加密傳輸

  32. Hidden data in JPEG Files • Digital cameras and image manipulation programs add hidden data to JPEG files. • For different reasons, one might want to remove these data before publishing the files on the Internet.

  33. Hidden Data in JPEG Files • Metadata in JPEG file: • Make and model of the digital camera • Time and date • Distance • Location information (GPS) • Small preview image • Others

  34. Cases and examples • Collect the photos of studying companion • A computer hacker was found by a disguised picture published. • Uncle’s birthday party v.s. Rocking concert

  35. Hidden Data in JPEG Files • How to remove Metadata • C:\jpeg+Jhead.exe

  36. Metadata Exif Specification Adobe tags

  37. Keylogger • Hardware • Software • Record and Mail • Credit card number,ID,code • Software introduction:Keyspy

More Related