privacy and encryption the threat of privacy due to the sale of sensitive personal information on...

19
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused by users Technological developments and how they are eroding privacy and anonymity Reasons why employers are monitoring employee’s computer usage How public-key encryption threatens U.S. security, both foreign and domestic The U.S. government’s proposed key recovery plan and how it threatens the growth of internet COMPUTERS IN YOUR FUTURE 2004 COMPUTERS IN YOUR FUTURE 2004 What You Will Learn

Upload: lindsay-singleton

Post on 24-Dec-2015

223 views

Category:

Documents


5 download

TRANSCRIPT

Page 1: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

Privacy and Encryption

The threat of privacy due to the sale of sensitive personal information on the internet

Definition of anonymity and how it is abused by users

Technological developments and how they are eroding privacy and anonymity

Reasons why employers are monitoring employee’s computer usage

How public-key encryption threatens U.S. security, both foreign and domestic

The U.S. government’s proposed key recovery plan and how it threatens the growth of internet commerce

COMPUTERS IN YOUR FUTURE 2004COMPUTERS IN YOUR FUTURE 2004

What You Will Learn

Page 2: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

What is identity theft?

Identity theft is obtaining enough information about an individual to open a credit card account in their name and charging items bought to that account

Examples of information needed are name, address, social security number and other personal information

Laws limit liability to $50 for each fraudulent charge

Affects credit reports

Page 3: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

The Internet and privacy

Privacy refers to an individual’s ability to restrict the collection, use and sale of confidential personal information

The Internet is eroding privacy through web sites selling information collected through registration forms

Few laws regulate selling personal information

Privacy refers to an individual’s ability to restrict the collection, use and sale of confidential personal information

The Internet is eroding privacy through web sites selling information collected through registration forms

Few laws regulate selling personal information

Page 4: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

The Internet and encryption

Encryption refers to the coding of information so that it is only readable by the intended recipient

Used in electronic commerce transactions and e-mail

Provides a way to use the Internet in a safe secure way

Could be used misused by criminals and terrorists

Page 5: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

What is anonymity?

Anonymity is the ability to convey a message without disclosing one’s identity

It can be abused because it frees people from accountability

Defamation is the act of injuring someone’s reputation by making false statements

Libel occurs when malicious statements are made in writing

Page 6: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

How is technology eroding privacy and anonymity?

Computers and the Internet enable marketing firms, snoops, and government officials to collect information in ways that are hidden from view

Methods used on the Internet are: Cookies Global Unique Identifiers (GUIDS)

Page 7: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

What are cookies?

Cookies are small files that are written to an individual’s hard drive by web sites visited

Legitimate purposes include recording information for future use; Example: retail sites using “shopping carts”

Questionable practices include banner ad companies tracking a user’s browsing actions and placing banner ads on web sites based on those actions

Page 8: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

Examples of cookies

Page 9: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

What is a global unique identifier (GUID)?

A GUID is a unique identification number generated by hardware or a program

Used to send user information back to site that created it

Page 10: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

Privacy in the workplace

Employees are given e-mail and Internet access at work

Companies concerned over employees wasting time surfing the net and sending personal e-mail

Three-quarters of large corporations monitor employees’ phone calls, e-mail, web browsing habits and computer files

Laws do not protect employees from being monitored

Page 11: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

Some things to remember at work

1.Do not use the employer’s phone for personal calls

2.Do not use the employer’s e-mail for personal messages

3.Assume everything you do at work is being monitored

Page 12: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

Protecting online privacy

1. Browse anonymously- Use web sites such as www.anonymizer.com or www.the-cloak.com

2. Disable cookies on your web browser

3. Use free e-mail addresses for information placed on web sites

4. Don’t divulge personal information to online strangers

5. Make sure registration forms have a privacy policy statement

Page 13: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

What is encryption?

Encryption refers to the coding of information so that it is only readable by the intended recipient

A readable message is called plaintext

Encryption key is a formula used to make plaintext unreadable

Symmetric key encryption algorithms are encryption techniques that use the same key to encrypt and decrypt a message

Data Encryption Standard (DES) is a commonly used encryption system

Page 14: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

What is public key encryption? Public key encryption uses two different keys

Public key is the encryption key Private key is the decryption key

Used in e-commerce transactions

Provides a secure channel for information

Computationally intensive or it places a heavy burden on the CPU

Vulnerable to cryptanalysis or code breaking

Key length is the length of an encryption key

Page 15: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

What are public security issues involving encryption?

Encryption can be used for illegal means as well as legitimate means Encryption will devastate law enforcements ability to fight crime Public key encryption can also be used in telephone conversations Law enforcement agencies are asking for laws enabling them to eavesdrop on encrypted messages

Page 16: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

HushmailEmail

Pretty Good Privacy

How can you protect your online privacy?

Page 17: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

Surfing Anonymously

Page 18: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

Anonymous Services

Page 19: Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused

THE

END