180 likes | 322 Views
Personal Privacy and Security. Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University. Introduction. Internet: Good or Bad? Privacy/Security Issues Victims? What victims? Scams: How hard are they to spot? Scams: FBI/NW3C. Which ones have you heard of?
E N D
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski, May 2012
Introduction • Internet: Good or Bad? • Privacy/Security Issues • Victims? What victims? • Scams: How hard are they to spot? • Scams: FBI/NW3C. Which ones have you heard of? • Privacy Threats • Tips to protect yourself • Security Threats • Tips to protect your computer Personal Privacy & Security - Z. Bahorski, May 2012
Internet: Good or Bad? • “Good” uses of the Internet • “Bad” uses of the Internet Personal Privacy & Security - Z. Bahorski, May 2012
Where the hackers are from! Trustwave Global Security Report 2012.pdf Personal Privacy & Security - Z. Bahorski, May 2012
Internet: Good or Bad? Should we keep it anyway? Quote: http://www.coursesmart.com/9780136008859/chap01# Personal Privacy & Security - Z. Bahorski, May 2012
Privacy/Security Issues: • What’s in a name? • Names with Positive connotations • Names with Negative connotations Personal Privacy & Security - Z. Bahorski, May 2012
Privacy/Security Issues: • How can people find information about us? Personal Privacy & Security - Z. Bahorski, May 2012
Privacy/Security Issues: • Can we really remain anonymous when we use the Web? • How much can a web site tell about you and your computer just by you connecting to their web site? • Go to: http://cyscape.com/showbrow.asp?bhcp=1 • To whom is it advantageous to gather information about you? • Go to: http://www.spokeo.com Personal Privacy & Security - Z. Bahorski, May 2012
Privacy/Security Issues: • Computers NEVER forget! • Sign in to Google or Gmail • In location box, type in: • http://www.google.com/history • Why DOES Google keep track of • Key words in Gmail • Search phrases Personal Privacy & Security - Z. Bahorski, May 2012
Victims? What victims? • According to the United States Census: • there are now 313,310,928 million people in the United States with over 7 billion in the world (USCB, 2012). • The Federal Trade Commission (FTC) estimates that, “as many as 9 million Americans have their identities stolen each year” (FTC, n.d.). • That is almost 3 percent of the American population! Personal Privacy & Security - Z. Bahorski, May 2012
Victims? What victims? • Identity theft • Using another person’s name, personal identification (driver’s license number, social security number), credit card, or banking information for personal gain • Taking advantage of credit history to:* • Buy a car (turn around quickly at an auction house) • Buy a house • Taking advantage of credit card or banking info: • Get cash • Open and pay for a cell phone account • Buy goods or services • Get government documents – for their new identity! Personal Privacy & Security - Z. Bahorski, May 2012
Victims? What victims? Identity theft – What to do if you are a victim: • Keep a DETAILED log including dates, times, names and numbers called. Do these 4 things: • Call or go online and place a fraud alert: • TransUnion: 1-800-680-7289; www.transunion.com; • Equifax: 1-800-525-6285; www.equifax.com; • Experian: 1-888-EXPERIAN (397-3742); www.experian.com; • Close the accounts that have been compromised. • File a complaint with the FTC to help police track like-thefts. • File a police report (give them a copy of your FTC complaint to add to the police report). From the FTC at: http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html Personal Privacy & Security - Z. Bahorski, May 2012
Privacy Threats • Surveillance: • Cameras • Look up! Cameras are “everywhere” (public places and in private places where posted) Look for these! You’ll be amazed! • Case: Don’t take pictures in private places • Cookies • For an explanation of cookies, go to: • http://www.cookiecentral.com/n_cookie_faq.htm#what_are • Spying on Cell Phones: go to http://www.mobilespytool.com/ Personal Privacy & Security - Z. Bahorski, May 2012
Privacy Threats • Surveillance cont… • Keyloggers • Record keys pressed on keyboard: Hardware or Software (easy to do, directions are available on the Internet!) • How to Add a keylogger: http://www.youtube.com/watch?v=0X9kNpOJiNQ • Is “FREE” Internet really “free”? • Be careful of fake wi-fi • Just how much surveillance is allowed in the workplace? • Go to: http://www.youtube.com/watch?v=lO3wuYiITiE Personal Privacy & Security - Z. Bahorski, May 2012
Tips to Protect Yourself! • Protecting yourself online: • Go to: Youtube.com video: Online Security Tips and Most Used Passwords To Avoid • http://www.youtube.com/watch?v=EVODZBOFftI&feature=relmfu • 5 tips to help protect yourself online: (This list is from the PrivacyNowTV video) 1. Don’t use a single password 2. Never access online accounts through an email link 3. Never click on popup ads 4. Macs are vulnerable to phishing scams 5. Use a dedicated credit card for online purchases Personal Privacy & Security - Z. Bahorski, May 2012
Tips to Protect Yourself! • Protecting yourself online: • (my 6th): Do not reply to an email to “unsubscribe”! • (my 7th): NEVER post anything online that you don’t want posted on a billboard on I-94! • Includes: Personal information, pictures, poetry, reports (papers), etc. • Facebook (and their “partners”) can USE any picture that you post for any reason. • ANY employer (current or future) can view anything you post onto Facebook. (Don’t think that only your friends can see your stuff.) They can pay for this. • (my 8th): Don’t use information (such as pet names) as passwords if you include that info online. Personal Privacy & Security - Z. Bahorski, May 2012
Tips to Protect Your Computer! • Protecting your computer: • Tips to help you protect your computer from viruses and spyware: • Keep your Operating System updated (don’t ignore updates!) • Install a firewall • Install antivirus software (2 if you can) • Do not open attachments from unknown sources • Do not run programs that you’ve downloaded from online unless you check it for viruses first! • Do not download from unknown sites. • Do not click on ads • DO surf wisely! Is the site REALLY worth the RISK? Personal Privacy & Security - Z. Bahorski, May 2012
Contact Information • Zenia C. Bahorski Ph.D. • 511 Pray-Harrold Hall • Department of Computer Science • Eastern Michigan University • Email: zbahorski@emich.edu • Web page: people.emich.edu/zbahorski • Images: Microsoft Clipart Personal Privacy & Security - Z. Bahorski, May 2012