Sie sind auf Seite 1von 13

[Type the document title]

[Year]

[Type the document


title]
[Type the document subtitle]
[Type the abstract of the document here. The abstract is typically a short summary
of the contents of the document. Type the abstract of the document here. The
abstract is typically a short summary of the contents of the document.]

Rashida & Asifa


[Type the company name]
[Pick the date]
Table of content
 Privacy
 What is difference between privacy and security?
 What is computer privacy?
 Ways of computer privacy
 Information
 Information security
 Information can be…..
 Hoe measure to protect computer security
 What is ethics
 Important issues in computer ethics
 Conclusion.
 References
INTRODUCTION:
Information privacy, or data privacy is the relationship between the collection and
dissemination of data and the public expectation of privacy. The safeguarding
of personal data is the objective i.e. data about individuals such as contact information,
health, financial, and family information; these individuals could be your employees,
your customers and other stakeholders. There are various legal, regulatory, political,
and technological issues surrounding the issue of data privacy.Information security is
the practice of defending information – in all forms - from unauthorized access, use,
examination, disclosure, modification, copying, moving, or destruction. There are
numerous global and industry standards and regulations mandating information security
practices for organizations.

What is difference between privacy and security information?


Understanding the difference between privacy and security will explain why a privacy
program is dependent upon a security program, explain with a example
Example of daily routine.

Privacy, security, and windows


Consider a window in your home. It provides various functions for you. It allows you to look
outside. It lets sunlight into your home. A window keeps weather outside. You can open a
window to let in fresh air. In an emergency, you can use a window as an exit

.A window is also vulnerable. Just as you can use it as an egress, others can use it as an
entrance. To protect against unwanted visitors, you can put bars or a grate in front of the
window. This still allows you to keep all of the desired functionality the window provides. This
is security.

Just as you can look out a window, others can look in. Preventing unwanted eyes from
looking in can be addressed by putting a drape, a curtain, or a shade inside of the window.
This is privacy. Obscuring the view inside of your home also provides a little security as
intruders may not be able to tell when you are home or see the things you own

What is c omputer privacy?

Pervicy is term is used to describe an individuals and how safe they feel in a location.
Computer privacy refers to information shared with visiting web pages’,how that information
is used with,or if the that information is ued to tracker users.

Every one takes privacy in normal life for granted computer also have privacy
When dealing with computrs,security and privacy are almot synonyms.

Exampls of computry privacy

1. User accounts

2. File protection

3. Internet user

Ways of computer privacy


Threr are three mian ways of computer privacy

1. Password

2. Encryption

3. Email privacy

Password

A password is a word or string of characters used for user authentication to prove identity or access
approval to gain access to a resource (example: an access code is a type of password), which is to
be kept secret from those not allowed access.

1 .A secret word or expression used by authorized persons to prove their right to access, information, etc.
2. A word or other string of characters, sometimes kept secret or confidential, that must be supplied by a
user in order to gain full or partial access to a computer, computer system, or electronic device.
ENCRYPTION:
What is Encryption?

 In a nutshell, encryption is the process of encoding messages and/or


information. In the tech world, it’s commonly regarded as the most effective
way to achieve data security.

 Encryption is actually a very simple concept. If you think back to any


puzzle you solved as a kid that required ‘cracking the code’ to decode a
sentence, then you’ve had some personal experience with encryption.

The code that you used to crack the sentence is the ‘cipher’– also known
as the encryption key. An encryption key is required to allow the person
receiving the message to decipher the message

How Does Encryption Work?

In the online world, encryption is the conversion of data into a jumbled, gibberish
form, so that it can only be read by the individuals it was intended for– those
people, essentially that have the ‘encryption key’ to unscramble it.There are two
main types of encryption: Symmetric Key Encryption and Public Key
Encryption. What are the differences between the two?

Symmetric Key Encryption uses the same key for encrypting and decrypting
information. The symmetric key is also known as a secret key. This is because it
is a shared secret between the sender and receiver of the information.
Otherwise, the confidentiality of the information shared between the two parties
would be compromised.

Public Key Encryption, also known as asymmetric key algorithms, is a kind of


encryption that uses different keys for encrypting and decrypting information.
Public key encryption includes the use of both a private key (known only to its
owner) and a public key (a key available and known to other entities on the
network). In essence, this means that information encrypted with a public key can
only be decrypted with the corresponding private keys.

There are also different levels of encryption. Among the highest levels are 128-bit
and 256-bit. The number of bits indicates the size of the size of the key. Just like
a longer password, a larger key has more possible combinations, and of course,
the more possible combinations, the harder the code is to crack. For instance,
128-bit encryption is one trillion times stronger than 40-bit encryption. Both
128-bit and 256-bit are the preferred military and bank-grade levels of encryption.
What is email privacy?

Email privacy is the broad topic dealing with issues of unauthorized access and inspection
of electronic mails. This unauthorized access can happen while an email is in transit, as well as
when it is stored on email servers or on a user computer. In countries with a constitutional guarantee
of the secrecy of correspondence, whether email can be equated with letters and get legal protection
from all forms of eavesdropping comes under question because of the very nature of email. This is
especially important as relatively more communication occurs via email compared to via postal mail.
 When we send a message by email.the message is broken into paaskets
ar snt out over the internet
 The number of pakckets dependent on the size of message
 Each message has the internet address of the recipient.
 This mean there may be some places between the packets could be
intercepted and examined.
What is Computer Security?
Computer Security is the protection of computing systems and the data that they store
or access.
Why is Computer Security Important?
Computer Security allows the University to carry out its mission by:
 Enabling people to carry out their jobs, education, and research
 Supporting critical business process
 Protecting personal and sensitive information
Why do I need to learn about Computer Security? Isn't this just an I.T. problem?
Good Security Standards follow the "90 / 10" Rule:
 10% of security safeguards are technical.
 90% of security safeguards rely on the computer user ("YOU") to adhere to good
computing practices
 Example: The lock on the door is the 10%. You remembering to lock the lock,
checking to see if the door is closed, ensuring others do not prop the door
open,keeping control of the keys, etc. is the 90%. You need both parts for
effective security.
What is information security:
Information Security

Information security is the theory and practice of only allowing access to information to people in an
organization who are authorized to see it. While this includes access to information contained on
computers, the concept is much broader than computers, encompassing all records under the control of an
organization.
The concept originated with the U.S. Central Intelligence Agency as a way to make sure documents were
safe from being altered or accessed by people who weren't supposed to be able to obtain them, especially
classified information.
There are a few basic principles when it comes to information security

Confidentiality
One of the first basic principles is confidentiality. This simply means that information is not available to
people who aren't authorized to view it. For example, in many companies information on how much
employees are paid is kept secret. If an employee accessed the payroll records and found how much a
colleague was paid, it would be a violation of the principle of confidentiality.

Integrity
Integrity in the context of information security means that people can trust that the information in an
organization hasn't been tampered with in some way. For example, the accounting department in a
company needs to be sure that sales data, expense data and so on are accurate so they can generate
quarterly financial statements. If a company was found to be falsifying financial data, it could be in
serious trouble.

Availability
Availability means that people who are authorized to view data can do so when they need access. Since
so much information is contained in computer systems, this means that IT departments have to make sure
their systems are as reliable as possible.
In large enterprise organizations, mainframe computers, with their reliability and redundant components,
have long been the gold standard for high availability systems. These machines can run for years without
having to be taken down for maintenance.
Information security can be come..
 Created
 Stored
 Destored
 Processed
 Transmited
 Used
 Corrupted
 Lost
 Stolen

hackers
A hacker is an individual who uses computer, networking or other skills to
overcome a technical problem. The term hacker may refer to anyone with
technical skills, but it often refers to a person who uses his or her abilities to
gain unauthorized access to systems or networks in order to commit crimes. A
hacker may, for example, steal information to hurt people via identity theft,
damage or bring down systems and, often, hold those systems hostage to
collect ransom.

The term hacker has historically been a divisive one, sometimes being used
as a term of admiration for an individual who exhibits a high degree of skill, as
well as creativity in his or her approach to technical problems. However, the
term is more commonly applied to an individual who uses this skill for illegal or
unethical purposes.

Types of hackers
The security community has informally used references to hat color as a way
different types of hacker are identified, usually divided into three types: white
hat, black hat and gray hat.

 White hat hackers, also known as ethical hackers, strive to operate in the
public's best interest, rather than to create turmoil. Many white hat hackers
work doing penetration testing, hired to attempt to break into the company's
networks to find and report on security vulnerabilities. The security firms then
help their customers mitigate security issues before criminal hackers can
exploit them.

 Black hat hackers intentionally gain unauthorized access to networks and


systems with malicious intent, whether to steal data, spread malware or
profit from ransomware, vandalize or otherwise damage systems or for any
other reason -- including gaining notoriety. Black hat hackers are criminals
by definition because they violate laws against accessing systems without
authorization, but they may also engage in other illegal activity, including
identity theft and distributed denial-of-service attacks.

 Gray hat hackers fall somewhere between white hat hackers and black hat
hackers. While their motives may be similar to those of white hat hackers,
gray hats are more likely than white hat hackers to access systems
without authorization; at the same time, they are more likely than black hat
hackers to avoid doing unnecessary damage to the systems they hack.
Although they aren't typically -- or only -- motivated by money, gray hat
hackers may offer to fix vulnerabilities they have discovered through their
own, unauthorized, activities rather than using their knowledge to exploit
vulnerabilities for illegal profit.

Hacker vs. cracker

The term hacker was first used in the 1960s to describe a programmer or an
individual who, in an era of highly constrained computer capabilities, could
increase the efficiency of computer code in a way that removed, or "hacked,"
excess machine-code instructions from a program. It has evolved over the
years to refer to a person with an advanced understanding of computers,
networking, programming or hardware.

For many in technology, the term hacker is best applied to those who use their
skills without malicious intent, but over time the term has been applied to
people who use their skills maliciously. To counter the trend of labeling skillful
technologists as criminals, the term cracker was proposed for criminal
hackers, with the intention of removing the stigma from being labeled a
hacker.

Within the hacker-cracker framework, hackers are those who seek to identify
flaws in security systems and work to improve them, including security experts
tasked with locating and identifying flaws in systems and fixing those
vulnerabilities. Crackers, on the other hand, are intent on breaching computer
and network security to exploit those same flaws for their own gain.

While technologists have promoted use of the term cracker over the years, the
distinction between differently motivated hackers is more commonly
referenced by the use of white hat, gray hat or black hat. In general use,
cracker hasn't found much traction.

Measure to protect security


Restrictind access:
1. Some time security matter of putting guareds on company computer
rooms and checking the identification of everyone admitted,other
times its use
Biometric:
Sanningi ssuch a finger print or iris
password:
password are the secret words or phrase must be keyed into a computer sytem
to gain a acces.
What is ethics
Standreds of moral products
 The right to keep personal information, such as credit ratings and medical
histories, from getting into unauthorized hands
Major issues in computer ethics
1.Copyright
2. Plagiarism

copyright

1. What is a Copyright?
Fundamentally, copyright is a law that gives you ownership over the things you create.
Be it a painting, a photograph, a poem or a novel, if you created it, you own it and it’s
the copyright law itself that assures that ownership. The ownership that copyright law
grants comes with several rights that you, as the owner, have exclusively. Those rights
include:

 The right to reproduce the work


 to prepare derivative works
 to distribute copies
 to perform the work
 and to display the work publicly

These are your rights and your rights alone. Unless you willingly give them up (EX: A
Creative Commons License), no one can violate them legally. This means that, unless
you say otherwise, no one can perform a piece written by you or make copies of it,
even with attribution, unless you give the OK.

Inversely, if you’re looking for material to use or reuse, you should not do any of these
things without either asking permission or confirming that the work is in the public
domain, which means that the copyright has expired and all of the above rights have
been forfeited. Simply put, if the work isn’t in the public domain and you don’t have
permission to use a piece, you put yourself in risk of legal action, regardless of your
intentions.

Many people think of plagiarism as copying another's work or borrowing someone else's
original ideas. But terms like "copying" and "borrowing" can disguise the seriousness of
the offense:

According to the Merriam-Webster online dictionary, to "plagiarize"


means:

 to steal and pass off (the ideas or words of another) as one's own
 to use (another's production) without crediting the source
 to commit literary theft
 to present as new and original an idea or product derived from an existing source
In other words, plagiarism is an act of fraud. It involves both stealing someone else's
work and lying about it afterward.

But can words and ideas really be stolen?

According to U.S. law, the answer is yes. The expression of original ideas is considered
intellectual property and is protected by copyright laws, just like original inventions.
Almost all forms of expression fall under copyright protection as long as they are
recorded in some way (such as a book or a computer file).

All of the following are considered plagiarism:

 turning in someone else's work as your own


 copying words or ideas from someone else without giving credit
 failing to put a quotation in quotation marks
 giving incorrect information about the source of a quotation
 changing words but copying the sentence structure of a source without giving credit
 copying so many words or ideas from a source that it makes up the majority of your
work, wher you give credit or not (see our section on "fair use" rules)

Privacy software is software built to protect the privacy of its users. The software typically works in
conjunction with Internet usage to control or limit the amount of information made available to third
parties. The software can apply encryption or filtering of various kinds.

Privacy software can refer to two different types of protection. One type is protecting a
user's Internet privacy from the World Wide Web. There are software products that will mask or hide
a user's IP address from the outside world in order to protect the user from identity theft. The second
type of protection is hiding or deleting the users Internet traces that are left on their PC after they
have been surfing the Internet. There is software that will erase all the users Internet traces and
there is software that will hide and encrypt a user's traces so that others using their PC will not know
where they have been surfing.

Refernces

1. Uberveillance and the social implications of microchip implants : emerging technologies. Michael, M.
G.,, Michael, Katina, 1976-. Hershey, PA. ISBN 1466645822. OCLC 843857020.
2. Jump up^ Programme Management Managing Multiple Projects Successfully. Mittal, Prashant. Global
India Pubns. 2009. ISBN 9380228201. OCLC 464584332.
3. Jump up^ Torra, Vicenç (2017), "Introduction", Studies in Big Data, Springer International Publishing,
pp. 1–21, doi:10.1007/978-3-319-57358-8_1, ISBN 9783319573564, retrieved 2018-09-27
4. Jump up^ Robert Hasty, Dr Trevor W. Nagel and Mariam Subjally, Data Protection Law in the
USA.(Advocates for International Development, August 2013.)"Archived copy" (PDF). Archived
from the original (PDF) on 2015-09-25. Retrieved 2013-10-14.
5. Jump up^ "Institutional Review Board - Guidebook, CHAPTER IV - CONSIDERATIONS OF
RESEARCH DESIGN". www.hhs.gov. October 5, 2017. Retrieved October 5, 2017.
6. Jump up^ Bergstein, Brian (2006-06-18). "Research explores data mining, privacy". USA Today.
Retrieved 2010-05-05.

Das könnte Ihnen auch gefallen