mis - privacy issues

24
PRIVACY ISSUES

Upload: jeffin-jose

Post on 03-Jan-2016

60 views

Category:

Documents


5 download

DESCRIPTION

MIS Privacy Issues

TRANSCRIPT

Page 1: Mis - Privacy Issues

PRIVACY ISSUES

Page 2: Mis - Privacy Issues

Privacy is . . .

• “the right to be left alone” or as

• “state or condition of limited access to a person.”

• A classic definition describes privacy as the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.

Page 3: Mis - Privacy Issues

Key Elements of Information Privacy

1.Separateness - ability to describe the boundaries and ownership or access rights to information.

2.Restricted access - the ability to protect the identified data.

3.Beneficial use - implies that only data owners or parties explicitly authorized to receive the information are able to benefit from its use.

Page 4: Mis - Privacy Issues

Privacy Issues

1. Cookie proliferation

2. Seizing cloud data

3. E-mail Concerns

4. Computer Matching

5. Wireless privacy challenges

6. Denial of service attacks

7. Software vulnerability

Page 5: Mis - Privacy Issues

Cookie Proliferation

• The invisible cookie software agents that track your browsing habits and personal data.

• Advertising networks, marketers, and other data profiteers depend on cookies to learn more about who you are.

Page 6: Mis - Privacy Issues

Seizing Cloud Data

• The files stored in Cloud based Data servers are vulnerable to privacy loopholes.

• Absence of adequate legal framework.

• 36 percent of the consumer content will be stored in the cloud by 2016.

Page 7: Mis - Privacy Issues

E-mail Concerns

• Corporations and individuals are now using e-mail as a major means of communication.

• Two types of threats :

1.Spamming

2.Flaming

Page 8: Mis - Privacy Issues

Spamming

•Sending of unsolicited e-mail by mass advertisers.

•Used to spread computer viruses or infiltrate systems.

Flaming

•Sending of critical and vulgar e-mail messages.

Page 9: Mis - Privacy Issues

Computer Matching

• Selling of information about customers from database to other parties.

• Consumers are then subjected to a barrage of unsolicited promotional material.

Page 10: Mis - Privacy Issues

Wireless Privacy Challenges

• Wifi transmission technology uses spread spectrum transmission

• Here a signal is spread over a wide range of frequencies and the particular version of spread spectrum transmission used .

• Standards like 802.11 was designed to make it easier for stations to find and here one another.

• This wifi standard can be easily penetrated by outsiders. Hackers may use this gap to access vital servers.

Page 11: Mis - Privacy Issues

Denial of Service Attacks

• Hackers flood a network server or webserver with many thousands of false communication or requests for service to crash the network .

• The network receives somany querries that it cannot keep up with them and is thus unavailable to service legitimate request.

• It causes the website to shut down , making it impossible for legitimate users to access the site.

Page 12: Mis - Privacy Issues

Software Vulnerability

• Software errors also pose a constant threat to information systems.

• The problem is the presence of hidden bugs or program code defects .

Page 13: Mis - Privacy Issues

Measures to Protect Privacy

1. Web-bugs 2. Virtual Private Networking3. IPSec (Ipv6)4. Cookies5. Security outsourcing 6. Access control 7. Intrusion detection systems 8. Securing wireless networks 9. Ensure software reliability 10.Secured Socket Layer

Page 14: Mis - Privacy Issues

Web-bugs• Which provides server capability to

monitor the behaviour of the visitor.

• Web bugs are tiny graphic files inserted in e-mail messages and web pages , which monitor the visitor behaviour .

• These tiny files identify the visitor , and keep track of pages visited and transmit this information to website monitor computer.

Page 15: Mis - Privacy Issues

Virtual Private Networking (VPN)

• VPN technology provides the medium to use the public Internet backbone as an appropriate channel for private data communication.

• With encryption and encapsulation technology, a VPN essentially carves out a private passageway through the Internet.

Page 16: Mis - Privacy Issues

IPSec (Ipv6)• IPSec provides security for transmission of

sensitive information over unprotected networks.

• IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec devices ("peers")

• With IPSec, data can be transmitted across a public network without fear of observation, modification, or spoofing.

Page 17: Mis - Privacy Issues

Cookies• The technology produces tiny files deposited

on computer hard disk known as cookies.

• These cookies are designed to collect the data about the visitors and retain it for the future guidance.

Page 18: Mis - Privacy Issues

Security Outsourcing

• The main security function can be outsourced to managed security service providers (mssp).

• It monitor network activity and perform vulnerability testing and intrusion testing.

• GUARDENT, COUNTERPANE, VERISIGN are some mssp’s now available.

Page 19: Mis - Privacy Issues

Access Control

• These are the policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders

Page 20: Mis - Privacy Issues

Intrusion Detection Systems

• It is a full time monitoring tool placed at the most vulnerable points or hot spots of corperate networks.

• It is for detect and deter intruders continually. The system generates an alarm if it finds any suspicious program attacking.

Page 21: Mis - Privacy Issues

Securing Wireless Networks• WEP provides some margin of security if wi-fi

users remember to activate it.• Wifi protected access improves data

encryption by replacing the static encryption keys with longer 128-bit keys that continually change ,making them harder to crack. wpa provides another facility known as extensible authentication protocol (EAP).

• It works with central authentication server to authenticate each user on the network before user can join it..

Page 22: Mis - Privacy Issues

Ensure Software Reliability

• Devote more attention to software reliability and quality.

• Errors should be corrected at the early stage of software design before when it is programmed.

• Thorough testing ferther reduces software errors , even though it may be impossible to eliminate them completely.

Page 23: Mis - Privacy Issues

Secured Socket Layer (SSL)

• SSL is a communication system that ensures privacy when communicating with other SSL-enabled products.

• SSL is a protocol that runs above TCP/IP and below HTTP or other top-level protocols.

• It is symmetric encryption nested within public-key encryption, authenticated through the use of certificates.

• An SSL connection can only occur between an SSL-enabled client and an SSL-enabled server.

Page 24: Mis - Privacy Issues

THANK YOU