Information & Communication Technology ~Lesson 9~

Preview:

Citation preview

Information & Communication Technology

Lesson 9Privacy in Computer Usage

What is PRIVACY!!!!???Privacy in ICT refers to the privacy and

confidentiality of data in computer usage.Data, on the other hand, refers to raw and

unprocessed facts, figures and symbols.Information privacy is described as the rights

of individuals and companies to deny or restrict the collection and use of information about them.

Ways Computer Technology Threaten Our Privacy

Cookiesare used to identify users by web casting, e-

commerce and other web applications.contain user information and are saved in the

computer hard disk.are used by certain websites to store

passwords and track how regularly we visit the website.

enable web sites to collect information about our online activities and store them for future use.

THESE ARE NOT

‘COOKIES’!!!

Electronic Profileelectronic profile is a set of data that is

collected from computer user and stored in a database, this profile have high potential to be sold to a third party without legal consent.

this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers.

the information in electronic profile includes personal details such as your age, address and marital status.

Examples of Electronic Profile

Spywarerefers to a program that collects user

information without user’s knowledge.can enter computers, sneaking in like a virus.is a result of installing new programs. A

computer can also be infected with spyware when they visit unreliable and dangerous websites.

communicates information it collects to some outside source while we are online.

can only be remove completely with anti-spyware software

Advertisements & SpamWhen you click an advertisement in certain

websites, your profile will be save in their database.

Spam is unsolicited e-mail messages, advertisements or newsgroup postings sent to many recipients at once. They obtained the users’ emails from other websites.

Examples of Spam & Advertisements

Why do we need privacy?

We need privacy so that:-We can have the benefit of anonymity.We won’t be track using our cookies.We can have confidentiality. We can prevent our private lives and habits

being exposed to third parties.

Can Our Privacy Be Protected????

Of course we can…….. Usually by...

Privacy lawOur government law of privacy focus on:-

1. Security services to review the security policy.

2. Security Management to protect the resources.

3. Security Mechanism to implement the required security services.

4. Security objects, the important entities within the system environment.

Undang-undang Privasi Siber

Perkhidmatan Keselamatan

yang memantau

polisi keselamatan.

Pengurusan Keselamatan

yang melindungi

sumber-sumber.

Mekanisme Keselamata

n yang melaksanakan khidmat keselamata

n.

Objek Keselamatan iaitu entiti

yang penting dalam sistem persekitaran.

Software Utilities

1. Privacy in computer can be protected by using certain software.

2. Firewall will prevent spyware from the internet entering our computer.

3. Anti-virus and anti-spyware will search and remove all type of spyware.

SummaryPrivacy in ICT refers to data and information

privacy and the right of individuals and companies to restrict the collection and use information of others.

There are three ways computer technology can harm our privacy:By cookiesBy electronic profilesBy spyware

Privacy can be protected by privacy law and utilities software.

Questions!!!1. After installing a new software in his computer,

Rashid discovered that he kept getting a lot of spam mails in his inbox. It turns out that his computer was infected with several spyware.

a. What can he do to prevent the spyware from spreading inside his computer?

b. From the passage, give the definition of“cookies”.

c. Give one other example how computer technology can threaten

our privacy.

Questions!!!2. A famous celebrity in Malaysia was revealed to

be a party girl when in fact she is the icon for religious program in television. The news spread wildly in the internet and over 5 million watch the video and pictures regarding this incident.

a. From the passage above, according to the law of privacy, what exactly happen to this certain celebrity.

b. Give two other reasons why do we need privacy.

c. State two enactments that is contain in the privacy law that suppose to protect this certain celebrity.

The END…..Acknowledgement

Group 2:

Muhd. ZhafranMohd. Syahir

BalqisNurul Husna

Recommended