How It Applies In A Virtual World

advertisement
How It Applies In A Virtual World
Introduction
 Got cookies?
 Internet explorer
 What is internet Privacy?
 How secure your computer, files, and information is on
the world wide web
 The Pros and Cons
 User personalization versus user violation
 How can it be violated?
 Through media (google street view), phishing, cookies
 Taking Precautions
Spyware
 Definition-Malware that can collect information about
computer users without their knowledge. It can often
hinder a computer’s performance.
 Many anti-virus programs now have anti-spyware
features.
How does it occur?
 People can install them without meaning to as
spyware is often installed with other programs.
 There are two ways of doing this:
 Piggybacking on a desirable piece of software
 Trojan horse method i.e tricking the user into
downloading it.
 Can infect through security holes in internet
Effects of Spyware
 Can hinder a computer’s functionality
 System becomes slow
 Can disable firewall and ant-virus programs
Phishing
Definition: n. To
request confidential
information over the
Internet under false
pretenses in order to
fraudulently obtain
credit card numbers,
passwords, or other
personal data.
What is Phishing? When Did it Start?
 The term originated in the mid 1990s in
connection with AOL
 Phishing is usually done through fake emails or
through instant messaging.
 The user is prompted to provide important
information about bank accounts or credit card
numbers through emails and sites that look
legitimate, but are actually fake. Their information
can then be used to commit identity theft.
Is It Illegal?
 It is illegal to commit
Identity theft.
 It is not illegal to ask the
user to volunteer their
personal information.
 It is not illegal to send you
an important looking
message in order to
prompt the user into
volunteering the desired
information.
 Therefore phishing is only
illegal once the
information is used to
commit identity theft.
How Does This Affect The Common User?
How can you spot a phishing scam?
 Anyone can fall victim to
phishing, so every internet user
must use caution when
volunteering private information.
 Make sure that your connection is
secure.
 Signs that an email or site is not
authentic:
 Misspelled domain names (ex.
www.yohoo.com)
 It has variations of domains as well
(ex. www.yahoo-security.net)
 Don’t trust an email that leads you to a
website that only shows an IP address
(IP address ex. 102.199.60.250.)
What are cookies?
Cookies are text files stored on one’s computer after
visiting a website
Used for:
-Storing information such as a unique visitor ID
-Allowing customization of a webpage, such that it can
save information for the computer the person is
currently using.
Problems with Cookies
The information from cookies can be accessed by the
website, which can then sell your information to others,
allowing for ‘targeted’ ads
Based on the ‘profile’ built up by visiting certain websites
or by one’s search history, ads will attempt to be tailored
to one’s perceived interests
Verdict
Cookies are, for the most part, harmless
Delete your cookies once in a while – some have
expiration dates years in the future, and may persist
indefinitely
In addition, there exist many different pieces of software
for those who might want to manage their cookies and
maintain their privacy
What is this?
•360 degree
views from
visual
perspectives
of the street
•Online
access to
ANYONE!
Why it violates
one’s privacy?
•Gives real
pictures of
places.
•Where you live
•Where you
work
•Schools
•Public security
What can one
do?
•Nothing really….
Sorry
•Attempt to sue?
(has happened,
didn’t work)
What does this all mean?
 There are many ways for people to invade privacy
through computers not just limited to spyware,
phishing, cookies, and Google street view.
 In this computer filled world, people continuously find
ways to get access to private information.
 While some of these activities are illegal, not everyone
is caught. It is important for people to be aware of
strategies used to collect personal information.
 It is important for people to take precautions so their
private information is protected. No one wants their
passwords or credit card numbers stolen.
 Only give sensitive information to authenticated and




secure websites. Always validate websites or emails.
Run anti-virus/anti-spyware programs to ensure that
your information is not being collected.
Just in case, you can delete cookies.
Make sure that your internet connection is secure and
install a firewall.
Keep up to date on computer news and how to protect
yourself.
Download