Privacy of Information Technology

Embed Size (px)

Citation preview

  • 8/8/2019 Privacy of Information Technology

    1/13

    PRIVACY OF INFORMATIONPRIVACY OF INFORMATION

    TECHNOLOGYTECHNOLOGY

  • 8/8/2019 Privacy of Information Technology

    2/13

  • 8/8/2019 Privacy of Information Technology

    3/13

    Powerpoint Templates

    Page 3

    Concept of E-Privacy & Data Protection in

    Cyberspace

    In the Internet Era, larger amounts of information is

    collected and there are greater risk that such

    information will be disclosed.

    Maintaining of databases is not as much difficult task

    as maintaining its integrity, so in this era the mostconcerned debate is going on to innovative a perfect

    method of data protection.

  • 8/8/2019 Privacy of Information Technology

    4/13

    Powerpoint Templates

    Page 4

    In the electronic age, complete control over our

    privacy is not possible as we leave behind a trail of

    data, which often contains personal information,

    such as credit card, insurance, banks, hospitals,schools, tax, credit history, telephone etc. this can

    be analyzed from the following illustrations:-

    1. On every login to the e-mail account in the cyber

    cafes, the electronic trail of password remained

    left there unsecured.

  • 8/8/2019 Privacy of Information Technology

    5/13

    Powerpoint Templates

    Page 5

    2. On every use of credit card for purchasing purpose,

    the trail of brand preference, place of shopping etc.left behind.

    3.A list of technologies that have the potential to

    impact on privacy like Biometrics (such asfingerprints, hand geometry, face, voice, iris and

    keystroke recognition),Radio frequency

    identification (RFID),Smart cards, Voice over

    Internet Protocol (VoIP),Wireless technologies,Location detection technologies (like Global

    Positioning Systems),Data-matching and data

    mining technologies, Surveillance Technologies

  • 8/8/2019 Privacy of Information Technology

    6/13

    Powerpoint Templates

    Page 6

    Privacy in Technology Driven World

    There are means to capture digital footprints of user, who is

    browsing internet for various reasons. It all begins with

    capturing IP address. An Internet Protocol address (IP address)

    is a numerical label that is assigned to devices participating in

    a computer networkthat uses the Internet Protocol forcommunication between its nodes.

    Whenever a person browses, sends e-mails, chats online, he

    leaves distinctive IP address behind. By searching IPregistration database or conducting trace out, approximate

    physical location of IP address can be determined.

  • 8/8/2019 Privacy of Information Technology

    7/13

    Powerpoint Templates Page 7

    Other surveillance technologies used are: cookies, GlobalUnique Identifies (GUID), Web Bugs, e-mail or documentbugs & spy ware

    1. Cookies -

    It is a block of text (digital identification tags) which the

    website places in a file on a computer hard disk of a personto track his activity.

    2. GUID -

    Globally Unique Identifier (GUID) is software embedded inthe computers hardware. It can be read remotely from acrossthe network. For example:- If GUID embedded on Ethernetcards, used in LAN. Then you will listen all privateconversation / information's of all the computers connectedthrough LAN.

  • 8/8/2019 Privacy of Information Technology

    8/13

    Powerpoint Templates Page 8

    3. Web Bugs -

    These are being increasingly used by online advertisers to

    create users database. It occurs even though the person has not

    clicked on the banner ad.

    4. SPYWARE -

    Some software developers have included code with in their

    applications that cause the users computer to transmitinformation back to the software developer Via Internet.

  • 8/8/2019 Privacy of Information Technology

    9/13

    Powerpoint Templates Page 9

    Privacy & Data Protection Issues in IT Age

    BPO & Call Centre -

    India is preferred destination for offshore Business

    Outsourcing (Financial, Education, Legal, Banking,

    Healthcare, Marketing, Telecommunications services).

    Telemarketing-

    India is faced with a new phenomenon called telemarketing

    which has invaded millions of hapless Indians thanks to the

    widespread use of mobile phones and multiplicity of mobile

    telephone service providers in India.

  • 8/8/2019 Privacy of Information Technology

    10/13

    Powerpoint Templates Page 10

    The first step to data security is that to ensuring that all

    connections to important storage are made over virtual

    private network (VPN) channels.

    Hardware requirements for access (such as one-time

    numerical password generators) and rejection of connection

    attempts over unencrypted channels are important methods.

    All data should be in encrypted form.

    HOW TO MAINTAIN PRIVACY

  • 8/8/2019 Privacy of Information Technology

    11/13

    Powerpoint Templates Page 11

  • 8/8/2019 Privacy of Information Technology

    12/13

    Powerpoint Templates Page 12

    A virtual private network (VPN) is a computer network that uses a

    public telecommunication infrastructure such as the Internet to provide

    remote offices or individual users with secure access to their

    organization's network Secure VPNs use cryptographic tunneling protocols to provide

    confidentiality by blocking intercepts and packet sniffing, allowing

    sender authentication to block identity spoofing, and provide message

    integrity by preventing message alteration.

    Secure VPN protocols include the following: IPsec (Internet Protocol Security) was originally developed for IPv6,

    which requires it. This standards-based security protocol is also widely

    used with IPv4. L2TP frequently runs over IPsec.

    Transport LayerSecurity (SSL/TLS) can tunnel an entire network's

    traffic, as it does in the Open VPN project, or secure an individual

    connection. A number of vendors provide remote access VPN

    capabilities through SSL. An SSL VPN can connect from locations

    where IPsec runs into trouble with Network Address Translation and

    firewall rules.

  • 8/8/2019 Privacy of Information Technology

    13/13

    Powerpoint Templates Page 13

    A globally unique identifier or GUID is a special type of identifier used

    in software applications to provide a unique reference number. The

    value is represented as a 32 character hexadecimal string, such as

    {21EC2020-3AEA-1069-A2DD-08002B30309D}and usually stored as a 128 bit integer. The term GUID usually, but not

    always, refers to Microsoft's implementation of the Universally Unique

    Identifier (UUID) standard.

    GUIDs are used in software development as database keys,component identifiers, or just about anywhere else a truly unique

    identifier is required. GUIDs are also used to identify all interfaces and

    objects in COM programming.