1 / 9

Module 5: Anonymity, Security, Privacy and Civil Liberties

Module 5: Anonymity, Security, Privacy and Civil Liberties. Introduction Anonymity Security Privacy Ethical and Social Issues. Introduction. Information has increased in value The demand for information is high due to: High digitalization of information and increasing bandwidth.

duy
Download Presentation

Module 5: Anonymity, Security, Privacy and Civil Liberties

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Module 5: Anonymity, Security, Privacy and Civil Liberties • Introduction • Anonymity • Security • Privacy • Ethical and Social Issues Ethical and Social...J.M.Kizza

  2. Introduction • Information has increased in value • The demand for information is high due to: • High digitalization of information and increasing bandwidth. • Declining costs of digital communication. • Increased miniaturization of portable computers and other communications equipment. • Greater public awareness by the news media of the potential abuse of digital communication, especially the Internet. • The danger for misuse is real Ethical and Social...J.M.Kizza

  3. Anonymity • Absence of identity • There are two types of identity: • Pseudo • Untraceable • Anonymity on the Internet • Email • Other postings Ethical and Social...J.M.Kizza

  4. Security • Means to prevent unauthorized access • Consists of: • Confidentiality - to prevent unauthorized disclosure of information to third parties. • Integrity - to prevent unauthorized modification of files and maintain the status quo • Availability -: to prevent unauthorized withholding of information from those who need it when they need it. Ethical and Social...J.M.Kizza

  5. Security… • Perimeter security • Fence • Dog • Guards • Firewalls • Proxy - individual client requests conform to the pre-set conditions, then the firewall acts on the request • Filter -these are packet-level filters • Stateful Inspection: These firewalls combine the filter and proxy functionalities. • Passwords Ethical and Social...J.M.Kizza

  6. Information Security • Encryption • Plaintext • Ciphertext • Types: • Symmetric (fig 5.1) • Asymmetric (fig 5.2) Encryption standards • RSA • DES • PEMS • PGP • Authentication (fig 5.3) Ethical and Social...J.M.Kizza

  7. Privacy • Human value consists of: • Right to control external influences on individual information: • Solitude - right to be alone • Anonymity – right to have no public identity • Intimacy – right not to be monitored • Right to control personal information: • Reserve – right to control one’s information Ethical and Social...J.M.Kizza

  8. Information Gathering, Databases, and Privacy • Who has your name on a list and what they're doing with it? • companies you have done business with. • Individuals • Government agencies protect the customer through three requirements that the institutions must disclose to us: • Privacy Policy: through which the institution is bound to tell us the types of information the institution collects and has about us and how it uses that information. • Right to Opt-Out: through which the institution is bound to explain our recourse to prevent the transfer of our data to third party beneficiaries. • Safeguards: through which the institution must put in place policies to prevent fraudulent access to confidential financial information. Ethical and Social...J.M.Kizza

  9. Ethical and Social Issues • The ethics of privacy - with the advent of the Internet and electronic messages, confidentiality is a great concern. Computer technology has raised more privacy questions than it has found answers to • The ethics of security - the Internet is an insecure communications channel when it is used by a criminal. Ethical and Social...J.M.Kizza

More Related