26
Information & Communication Technology Lesson 9 Privacy in Computer Usage

Information & Communication Technology ~Lesson 9~

Embed Size (px)

Citation preview

Page 1: Information & Communication Technology ~Lesson 9~

Information & Communication Technology

Lesson 9Privacy in Computer Usage

Page 2: Information & Communication Technology ~Lesson 9~

What is PRIVACY!!!!???Privacy in ICT refers to the privacy and

confidentiality of data in computer usage.Data, on the other hand, refers to raw and

unprocessed facts, figures and symbols.Information privacy is described as the rights

of individuals and companies to deny or restrict the collection and use of information about them.

Page 3: Information & Communication Technology ~Lesson 9~

Ways Computer Technology Threaten Our Privacy

Page 4: Information & Communication Technology ~Lesson 9~

Cookiesare used to identify users by web casting, e-

commerce and other web applications.contain user information and are saved in the

computer hard disk.are used by certain websites to store

passwords and track how regularly we visit the website.

enable web sites to collect information about our online activities and store them for future use.

Page 5: Information & Communication Technology ~Lesson 9~

THESE ARE NOT

‘COOKIES’!!!

Page 6: Information & Communication Technology ~Lesson 9~

Electronic Profileelectronic profile is a set of data that is

collected from computer user and stored in a database, this profile have high potential to be sold to a third party without legal consent.

this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers.

the information in electronic profile includes personal details such as your age, address and marital status.

Page 7: Information & Communication Technology ~Lesson 9~

Examples of Electronic Profile

Page 8: Information & Communication Technology ~Lesson 9~
Page 9: Information & Communication Technology ~Lesson 9~
Page 10: Information & Communication Technology ~Lesson 9~
Page 11: Information & Communication Technology ~Lesson 9~

Spywarerefers to a program that collects user

information without user’s knowledge.can enter computers, sneaking in like a virus.is a result of installing new programs. A

computer can also be infected with spyware when they visit unreliable and dangerous websites.

communicates information it collects to some outside source while we are online.

can only be remove completely with anti-spyware software

Page 12: Information & Communication Technology ~Lesson 9~

Advertisements & SpamWhen you click an advertisement in certain

websites, your profile will be save in their database.

Spam is unsolicited e-mail messages, advertisements or newsgroup postings sent to many recipients at once. They obtained the users’ emails from other websites.

Page 13: Information & Communication Technology ~Lesson 9~

Examples of Spam & Advertisements

Page 14: Information & Communication Technology ~Lesson 9~
Page 15: Information & Communication Technology ~Lesson 9~
Page 16: Information & Communication Technology ~Lesson 9~
Page 17: Information & Communication Technology ~Lesson 9~

Why do we need privacy?

Page 18: Information & Communication Technology ~Lesson 9~

We need privacy so that:-We can have the benefit of anonymity.We won’t be track using our cookies.We can have confidentiality. We can prevent our private lives and habits

being exposed to third parties.

Page 19: Information & Communication Technology ~Lesson 9~

Can Our Privacy Be Protected????

Page 20: Information & Communication Technology ~Lesson 9~

Of course we can…….. Usually by...

Page 21: Information & Communication Technology ~Lesson 9~

Privacy lawOur government law of privacy focus on:-

1. Security services to review the security policy.

2. Security Management to protect the resources.

3. Security Mechanism to implement the required security services.

4. Security objects, the important entities within the system environment.

Undang-undang Privasi Siber

Perkhidmatan Keselamatan

yang memantau

polisi keselamatan.

Pengurusan Keselamatan

yang melindungi

sumber-sumber.

Mekanisme Keselamata

n yang melaksanakan khidmat keselamata

n.

Objek Keselamatan iaitu entiti

yang penting dalam sistem persekitaran.

Page 22: Information & Communication Technology ~Lesson 9~

Software Utilities

1. Privacy in computer can be protected by using certain software.

2. Firewall will prevent spyware from the internet entering our computer.

3. Anti-virus and anti-spyware will search and remove all type of spyware.

Page 23: Information & Communication Technology ~Lesson 9~

SummaryPrivacy in ICT refers to data and information

privacy and the right of individuals and companies to restrict the collection and use information of others.

There are three ways computer technology can harm our privacy:By cookiesBy electronic profilesBy spyware

Privacy can be protected by privacy law and utilities software.

Page 24: Information & Communication Technology ~Lesson 9~

Questions!!!1. After installing a new software in his computer,

Rashid discovered that he kept getting a lot of spam mails in his inbox. It turns out that his computer was infected with several spyware.

a. What can he do to prevent the spyware from spreading inside his computer?

b. From the passage, give the definition of“cookies”.

c. Give one other example how computer technology can threaten

our privacy.

Page 25: Information & Communication Technology ~Lesson 9~

Questions!!!2. A famous celebrity in Malaysia was revealed to

be a party girl when in fact she is the icon for religious program in television. The news spread wildly in the internet and over 5 million watch the video and pictures regarding this incident.

a. From the passage above, according to the law of privacy, what exactly happen to this certain celebrity.

b. Give two other reasons why do we need privacy.

c. State two enactments that is contain in the privacy law that suppose to protect this certain celebrity.

Page 26: Information & Communication Technology ~Lesson 9~

The END…..Acknowledgement

Group 2:

Muhd. ZhafranMohd. Syahir

BalqisNurul Husna