190 likes | 315 Views
COMPUTERS IN YOUR FUTURE 2004. What You Will Learn. Privacy and Encryption. The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused by users
E N D
COMPUTERS IN YOUR FUTURE 2004 What You Will Learn Privacy and Encryption • The threat of privacy due to the sale of sensitive personal information on the internet • Definition of anonymity and how it is abused by users • Technological developments and how they are eroding privacy and anonymity • Reasons why employers are monitoring employee’s computer usage • How public-key encryption threatens U.S. security, both foreign and domestic • The U.S. government’s proposed key recovery plan and how it threatens the growth of internet commerce
What is identity theft? • Identity theft is obtaining enough information about an individual to open a credit card account in their name and charging items bought to that account • Examples of information needed are name, address, social security number and other personal information • Laws limit liability to $50 for each fraudulent charge • Affects credit reports
The Internet and privacy • Privacy refers to an individual’s ability to restrict the collection, use and sale of confidential personal information • The Internet is eroding privacy through web sites selling information collected through registration forms • Few laws regulate selling personal information
The Internet and encryption • Encryption refers to the coding of information so that it is only readable by the intended recipient • Used in electronic commerce transactions and e-mail • Provides a way to use the Internet in a safe secure way • Could be used misused by criminals and terrorists
What is anonymity? • Anonymity is the ability to convey a message without disclosing one’s identity • It can be abused because it frees people from accountability • Defamation is the act of injuring someone’s reputation by making false statements • Libel occurs when malicious statements are made in writing
How is technology eroding privacy and anonymity? • Computers and the Internet enable marketing firms, snoops, and government officials to collect information in ways that are hidden from view • Methods used on the Internet are: • Cookies • Global Unique Identifiers (GUIDS)
What are cookies? • Cookies are small files that are written to an individual’s hard drive by web sites visited • Legitimate purposes include recording information for future use; Example: retail sites using “shopping carts” • Questionable practices include banner ad companies tracking a user’s browsing actions and placing banner ads on web sites based on those actions
What is a global unique identifier (GUID)? • A GUID is a unique identification number generated by hardware or a program • Used to send user information back to site that created it
Privacy in the workplace • Employees are given e-mail and Internet access at work • Companies concerned over employees wasting time surfing the net and sending personal e-mail • Three-quarters of large corporations monitor employees’ phone calls, e-mail, web browsing habits and computer files • Laws do not protect employees from being monitored
Some things to remember at work Do not use the employer’s phone for personal calls Do not use the employer’s e-mail for personal messages Assume everything you do at work is being monitored
Protecting online privacy Browse anonymously- Use web sites such as www.anonymizer.com or www.the-cloak.com Disable cookies on your web browser Use free e-mail addresses for information placed on web sites Don’t divulge personal information to online strangers Make sure registration forms have a privacy policy statement
What is encryption? • Encryption refers to the coding of information so that it is only readable by the intended recipient • A readable message is called plaintext • Encryption key is a formula used to make plaintext unreadable • Symmetric key encryption algorithms are encryption techniques that use the same key to encrypt and decrypt a message • Data Encryption Standard (DES) is a commonly used encryption system
What is public key encryption? • Public key encryption uses two different keys • Public key is the encryption key • Private key is the decryption key • Used in e-commerce transactions • Provides a secure channel for information • Computationally intensive or it places a heavy burden on the CPU • Vulnerable to cryptanalysis or code breaking • Key length is the length of an encryption key
What are public security issues involving encryption? • Encryption can be used for illegal means as well as legitimate means • Encryption will devastate law enforcements ability to fight crime • Public key encryption can also be used in telephone conversations • Law enforcement agencies are asking for laws enabling them to eavesdrop on encrypted messages • Clipper chip • Key escrow plan • Key recovery
How can you protect your online privacy? Hushmail Email Pretty Good Privacy
THE END