power point itgs

Upload: mauri1231

Post on 06-Apr-2018

233 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 Power Point ITGS

    1/14

    Mauricio Succetti4B

    Privacy

  • 8/3/2019 Power Point ITGS

    2/14

    What does privacy mean?

    The ability of an individual or group to seclude themselves orinformation about themselves and thereby reveal themselves

    selectively. The boundaries and content of what is considered private

    differ among cultures and individuals, but share basic commonthemes. Privacy is sometimes related to anonymity, the wish toremain unnoticed or unidentified in the public realm. When

    something is private to a person, it usually means there is somethingwithin them that is considered inherently special or personallysensitive. The degree to which private information is exposed

    therefore depends on how the public will receive this information,which differs between places and over time. Privacy is broader thansecurity and includes the concepts of appropriate use and protection

    of information.

  • 8/3/2019 Power Point ITGS

    3/14

    Types of Privacy

    - Physical Privacy- Informational Privacy-Organizaitonal privacy

  • 8/3/2019 Power Point ITGS

    4/14

    Physical privacy

    Physical privacy could be defined as preventing "intrusions into one's

    physical space or solitude" This would include such concerns as:

    -Preventing intimate acts or one's body from being seen by others forthe purpose of modesty; apart from being dressed this can beachieved by walls, fences, privacy screens, cathedral glass, partitions

    between urinals, by being far away from others, on a bed by a bedsheet or a blanket, when changing clothes by a towel, etc.; to whatextent these measures also prevent acts being heard varies

    -Video, of aptly named graphic, or intimate, acts, behaviors or bodyparts

    -Preventing unwelcome searching of one's personal possessions-Preventing unauthorized access to one's home or vehicle-Medical privacy, the right to make fundamental medical decisions

    without governmental coercion or third party review, most widelyapplied to questions of contraception

  • 8/3/2019 Power Point ITGS

    5/14

    Informational PrivacyData privacy refers to the evolving relationship between technology and the

    legal right to, or public expectation of privacy in the collection and sharing

    of data about one's self. Privacy concerns exist whereveruniquelyidentifiable data relating to a person or persons are collected and stored, indigital form or otherwise. In some cases these concerns refer to how data iscollected, stored, and associated. In other cases the issue is who is givenaccess to information. Other issues include whether an individual has anyownership rights to data about them, and/or the right to view, verify, and

    challenge that information.

    Types of Informational Privacy:-Financial Privacy-Internet Privacy-Medical Privacy

    -Sexual Privacy-Political Privacy

  • 8/3/2019 Power Point ITGS

    6/14

    Financial Privacy

    Where information about a person's financialtransactions is guarded, is important for the

    avoidance of fraud or identity theft. Informationabout a person's purchases can also reveal a great

    deal about that person's history, such as places they

    have visited, whom they have had contact with,products they use, their activities and habits, ormedications they have used.

  • 8/3/2019 Power Point ITGS

    7/14

    Internet Privacy

    Is the ability to control what information one revealsabout oneself over the Internet, and to control who

    can access that information. These concerns includewhether email can be stored or read by third partieswithout consent, or whether third parties can track

    the web sites someone has visited. Another concernis whether web sites which are visited collect, store,

    and possibly share personally identifiableinformation about users. Tools used to protect

    privacy on the internet include encryption tools andanonymizing services like I2P and Tor. (Both of

    them are softwares intended to enable Anonymity

  • 8/3/2019 Power Point ITGS

    8/14

    Medical Privacy

    Allows a person to keep their medical records frombeing revealed to others. This may be because they

    have concern that it might affect their insurancecoverage or employment. Or it may be because theywould not wish for others to know about medical orpsychological conditions or treatment which would

    be embarrassing. Revealing medical data could alsoreveal other details about one's personal life (such

    as about one's sexual activity for example)

  • 8/3/2019 Power Point ITGS

    9/14

    Sexual Privacy

    Prevents a person from being forced to carry apregnancy to term and enables individuals to

    acquire and use contraceptives and safe sex suppliesand information without community or legal review

  • 8/3/2019 Power Point ITGS

    10/14

    Political Privacy

    Has been a concern since voting systems emerged inancient times. The secret ballot is the simplest and

    most widespread measure to ensure that politicalviews are not known to anyone other than the

    original voter it is nearly universal in moderndemocracy, and considered a basic right of

    citizenship. In fact even where other rights ofprivacy do not exist, this type of privacy very often

    does.

  • 8/3/2019 Power Point ITGS

    11/14

    Organizational Privacy

    Governments agencies, corporations, and otherorganizations may desire to keep their activities orsecrets from being revealed to other organizationsor individuals. Such organizations may implementvarious security practices in order to prevent this.Organizations may seek legal protection for their

    secrets. For example, a government administrationmay be able to invoke executive privilege or

    declares certain information to be classified, or acorporation might attempt to protect trade secrets.

  • 8/3/2019 Power Point ITGS

    12/14

    Ways to Combat Privacy

    -Have a Up-Dated Antivirus, Antispyware, Anti-

    Spoofing and Firewall-Biometrics (Retina scanner, Fingerptints)-Passwords-Audit Trail (Records in a file succesfull and un-

    succesfull access attempts)-Possessed Objects (Key, Smart Cards)

  • 8/3/2019 Power Point ITGS

    13/14

    Password Protection

    Number of

    Characters

    Possible

    Combinations Human Computer

    1 36 3 minutes 0.0000018 seconds

    2 1,300 2 hours 0.00065 seconds

    3 47,000 3 days 0.02 seconds

    4 1,700,000 3 months 1 second

    5 60,000,000 10 years 30 seconds

    10 3,700,000,000,000,000 580 million years 59 years

  • 8/3/2019 Power Point ITGS

    14/14

    THE END