View
113
Download
0
Category
Tags:
Preview:
Citation preview
Information & Communication Technology
Lesson 9Privacy in Computer Usage
What is PRIVACY!!!!???Privacy in ICT refers to the privacy and
confidentiality of data in computer usage.Data, on the other hand, refers to raw and
unprocessed facts, figures and symbols.Information privacy is described as the rights
of individuals and companies to deny or restrict the collection and use of information about them.
Ways Computer Technology Threaten Our Privacy
Cookiesare used to identify users by web casting, e-
commerce and other web applications.contain user information and are saved in the
computer hard disk.are used by certain websites to store
passwords and track how regularly we visit the website.
enable web sites to collect information about our online activities and store them for future use.
THESE ARE NOT
‘COOKIES’!!!
Electronic Profileelectronic profile is a set of data that is
collected from computer user and stored in a database, this profile have high potential to be sold to a third party without legal consent.
this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers.
the information in electronic profile includes personal details such as your age, address and marital status.
Examples of Electronic Profile
Spywarerefers to a program that collects user
information without user’s knowledge.can enter computers, sneaking in like a virus.is a result of installing new programs. A
computer can also be infected with spyware when they visit unreliable and dangerous websites.
communicates information it collects to some outside source while we are online.
can only be remove completely with anti-spyware software
Advertisements & SpamWhen you click an advertisement in certain
websites, your profile will be save in their database.
Spam is unsolicited e-mail messages, advertisements or newsgroup postings sent to many recipients at once. They obtained the users’ emails from other websites.
Examples of Spam & Advertisements
Why do we need privacy?
We need privacy so that:-We can have the benefit of anonymity.We won’t be track using our cookies.We can have confidentiality. We can prevent our private lives and habits
being exposed to third parties.
Can Our Privacy Be Protected????
Of course we can…….. Usually by...
Privacy lawOur government law of privacy focus on:-
1. Security services to review the security policy.
2. Security Management to protect the resources.
3. Security Mechanism to implement the required security services.
4. Security objects, the important entities within the system environment.
Undang-undang Privasi Siber
Perkhidmatan Keselamatan
yang memantau
polisi keselamatan.
Pengurusan Keselamatan
yang melindungi
sumber-sumber.
Mekanisme Keselamata
n yang melaksanakan khidmat keselamata
n.
Objek Keselamatan iaitu entiti
yang penting dalam sistem persekitaran.
Software Utilities
1. Privacy in computer can be protected by using certain software.
2. Firewall will prevent spyware from the internet entering our computer.
3. Anti-virus and anti-spyware will search and remove all type of spyware.
SummaryPrivacy in ICT refers to data and information
privacy and the right of individuals and companies to restrict the collection and use information of others.
There are three ways computer technology can harm our privacy:By cookiesBy electronic profilesBy spyware
Privacy can be protected by privacy law and utilities software.
Questions!!!1. After installing a new software in his computer,
Rashid discovered that he kept getting a lot of spam mails in his inbox. It turns out that his computer was infected with several spyware.
a. What can he do to prevent the spyware from spreading inside his computer?
b. From the passage, give the definition of“cookies”.
c. Give one other example how computer technology can threaten
our privacy.
Questions!!!2. A famous celebrity in Malaysia was revealed to
be a party girl when in fact she is the icon for religious program in television. The news spread wildly in the internet and over 5 million watch the video and pictures regarding this incident.
a. From the passage above, according to the law of privacy, what exactly happen to this certain celebrity.
b. Give two other reasons why do we need privacy.
c. State two enactments that is contain in the privacy law that suppose to protect this certain celebrity.
The END…..Acknowledgement
Group 2:
Muhd. ZhafranMohd. Syahir
BalqisNurul Husna
Recommended