Title: Computers, Privacy, and Security
1Chapter 9
- Computers, Privacy, and Security
2Introduction
- With the rise of the Internet, personal data is
often made available online - Many government agencies make a wide range of
records available online - The accessibility of personal information on the
Internet raises security and privacy concerns - Security concerns include system failure and
securing online transactions and e-mail - Privacy concerns include the collection of
customer data, spam, and online activity tracking - Laws and software tools can protect an
individuals security and privacy
3Security Concerns
- System Failure
- Prolonged malfunction to a computer
- A crash (in user mode) occurs when an application
tries to execute an illegal instruction, and is
shut down by the operating system (OS) - A crash in the operating system itself can occur
as well, when for example it was hacked and
illegal instruction was attempted to be executed,
or drivers failed (which run in kernel mode), OS
updates were installed which were not completely
tested, etc. - A hang can also occur. For example, two or more
threads are deadlocked, or an application is
causing 100 CPU usage (ex. has an infinite loop)
and the machine appears frozen, there is a memory
leak in some application, so machine is out of
memory and appears frozen, etc.
4Security Concerns, cont.
- An environmental failure
- Undervoltage occurs when the electrical supply
drops below 120 volts (in the U.S.) - Overvoltage occurs when the incoming electrical
voltage increases significantly above 120 volts - Secure Internet Transactions and E-Mail
- Information transmitted over networks has a
greater security risk than internal data - There is no central administrator present on the
Internet - Data over the Internet may be routed through a
number of networks, any of which can be monitored - On an e-commerce site, intercepted data might
include contact and credit card information - An unprotected e-mail might contain personal or
confidential information
5Privacy Concerns
- When one uses a computer to send data over the
Internet, their privacy can potentially be
compromised - Personal information and online activity may be
shared - Personal information may be stored databases on
servers - Ex. health insurance, travel sites, government
- Some personal information may not be considered
private by a user, such as grocery store
purchases - Other information one may want protected, such as
medical history or Web surfing activity
6Collecting Customer Data
- Electronic profiling
- Companies can sell personal data to national
marketing firms and Internet advertising firms - These firms create profiles of customers to
identify their preferences, as well as buying
trends in general - Electronic profiles can be sold to other
companies - Privacy policies sometimes change without the
customers knowledge - Opt out policies should be clear and easy to find
- Privacy policies should be easy to understand
7Spam
- Any unsolicited junk e-mail message or newsgroup
posting sent to many recipients or newsgroups at
once - Often a result of companies sharing personal
information - Used to sell products, promote business
opportunities, special offers, etc. - Can contains viruses or spyware
- Accounts for almost half of all U.S. e-mail
traffic - May degrade the usefulness of e-mail
8Online Activity Tracking
- Cookie
- Small text file that a Web server stores on your
computer - Contains user data, such as user name and
preferences - Used for several purposes
- Customizes Web pages
- Stores username and password so that you do not
have to log in each time - Tracks which Web pages or ads you have visited
- Keeps track of items in your online shopping cart
- Web sites may sell cookie data, or use
third-party cookies to record click stream data
from any Web page or link
9Yahoo uses a cookie to store information about
your customized
MyYahoo page
10Types of cookies
11Online Activity Tracking, cont.
- Spyware
- A program placed on a computer without the users
knowledge that secretly collects information
about the user - Can enter the computer as a virus, or just
install itself in the background (when low
security settings are used) - Used by employers to monitor employees
- Used by firms to determine Web browsing habits
- Web bugs
- A graphic embedded on Web pages to collect
information about visitors to the site - Can store IP addresses, browser type, Web address
of previous page, time of visit, and a previously
set cookie value - Used to gather statistics or customize a a users
experience
12Carnivore is a FBI packet-sniffing program used
to monitor all data sent to and from a suspected
criminals computer
13Privacy Laws
- Electronic Communications Privacy Act
- Protects electronics communications
- Excludes businesses monitoring and the use of the
Carnivore program to monitor suspected criminals - Computer Fraud and Abuse Acts
- Outlaws unauthorized access to federal government
computers and the transmission of harmful
computer code - Fair Credit Reporting Act
- Limits people who can legally view a credit
report to those with legitimate business needs,
but does not define legitimate business need - Childrens Online Privacy Protection Act
- Requires parental permission for children over 13
for marketing or personal data
14Summary of the major U.S. laws concerning privacy
15Many Web sites demonstrate their commitment to
privacy by applying to be part of the TRUSTe
program
16Protecting against System Failure
- A surge protector protects against electrical
power variations - It smoothes out overvoltages, provides a stable
current flow, and keeps an overvoltage from
reaching computer equipment - An uninterruptible power supply (UPS) can provide
power during a temporary or permanent loss of
power - Contains surge protector circuits and one or more
batteries - Connects a computer with the power source
- Can shut down the computer properly if power is
out for a certain number of minutes
17Backing Up Data
- A backup is a duplicate of a file, program, or
disk that can be used if the original is lost,
damaged, or destroyed - Critical files should always be backed up and
stored off site - Can be stored on any storage media, including
tapes, CDs, DVDs, or on remote machine, or
duplicate hard drives - Can also be stored on an Internet hard drive,
also called online storage - Might be impractical without a high-speed
connection - Backups can be done manually, with a built-in
backup utility, or with a backup software package - Backup procedures specify a regular plan of
different types of backups
18Types of backups
19Defining a Disaster Recovery Plan
- A disaster recovery plan is a written plan
describing the steps a company would take to
restore computer operations in the event of a
disaster - The plan contains four components
- Emergency, backup, recovery, and test plans
- Companies may maintain a hot or cold site for
backup - A hot site is a separate facility that mirrors
the systems and operations of the main site - A cold site mirrors the main site, but does not
become operational until the main site is down
20Components of a disaster recover plan
21Protecting against Unauthorized Access and Use
- Access controls use a two-phase process
- Authentication verifies that the individual is
the person he or she claims to be - Authorization verifies the user has permissions /
privileges to access the resource requested, or
perform the actions requested - Firewalls prevent unauthorized access to services
through the network - Companies use firewalls to deny access to
outsiders, as well as to restrict employee access - A proxy server outside of the companys network
controls which communications pass into the
companys network - A personal firewall protects a personal computer
from undesirable network connections
22A firewall helps to prevent unauthorized access
to services, resources and data available on a
network
23Protecting against Unauthorized Access and Use,
cont.
- Intrusion detection software identifies possible
security leaks - Analyzes all network traffic, assesses system
vulnerabilities, identifies unauthorized access
or suspicious behavior patterns - A honeypot entices an intruder to hack a system
by posing as a simulated computer system /
virtual machine with security vulnerabilities
(not patched) - Therefore, all critical security updates for the
platform and services/applications running on it
should be installed as soon as they become
available (enable automatic updates) in order to
patch vulnerabilities. - A choice of a strong password can reduce chances
of gaining unauthorized access to a machine.
Password should be as long as possible,
containing letters (upper case and lower case),
numbers, and punctuation. A combination of two or
more words, or a pass-sentence is much more
difficult to generate through brut force
algorithms, or other password guessing programs
than a pass-word, as words are available in the
dictionary.
24Protecting against Unauthorized Access and Use,
cont.
- Possessed objects are items (usually cards,
badges, smart-cards) that users must carry to
gain access to a facility or computer - Biometric devices authenticate a persons
identity by translating physical characteristics
into a digital code (finger print, retina scan,
face recognition, etc.) - A callback system only allows to connect to a
computer after the computer calls the person back
at a previously established phone number - Audit logs maintain a file record of successful
and unsuccessful attempts to access a system
25Protecting against Hardware Theft
- School and companies use
- Physical access controls, such as locks
- Alarm systems
- Physical security devices such as cables that
lock equipment to a desk or cabinet - Small locking devices to secure access to a disk
drives - Mobile equipment users can
- Carry equipment with them at all times
- Lock it temporarily with a cable
- Install a mini-security system
26(No Transcript)
27Protecting Online Privacy -Encryption
- Encryption is the process of converting readable
data into unreadable characters to prevent
unauthorized access - The recipient must decrypt the data into a
readable form - Private key encryption
- Both the originator and recipient use the same
secret key to encrypt and decrypt the data - Public key encryption
- Both a public key and a private key are generated
- A message encrypted with your public key can only
be decrypted with your private key, and vice
versa - RSA encryption is a powerful public key
encryption technology used for transmitting data
over the Internet
28Four simple methods of encryption
29Protecting Online Privacy - Transactions
- Many Web browsers provide 40-bit or 128-bit
encryption (a random number used to encrypt
communication with SSL, after the initial
handshake). - A secure Web site uses encryption techniques
- Security protocols
- Secure Sockets Layer (SSL), or HTTPS, require the
server to have a digital certificate. The
certificate has two parts public key and a
private key, which are used for the encryption
algorithm. The public key is digitally signed by
the certification authority, which issued the
certificate. - The certificate contains information to identify
the web site such as web site name, company name,
and location. It also contains the certificate
authoritys (CA) name (which certifies the
company is who they say they are) a digital
signature, serial number of the certificate,
expiration date, etc. - Secure Electronics Transactions (SET)
Specification secures financial transactions on
the Internet
30Protecting Online Privacy E-mail and Spam
- Protect e-mail by
- Encrypting it with an e-mail encryption program
- Using a digital signature which attaches an
encrypted code to a document to verify the
identity of the sender - Reduce spam by
- Changing e-mail settings to block and delete spam
(junk mail filters if available) - If not, sign up for e-mail filtering services
that block e-mail messages from designated
sources - Use an antispam software
31Protecting Online Privacy - Cookies, Spyware,
and Web Bugs
- Set your browsers privacy setting to specify
what type of cookies you accept - You do not want to refuse all cookies, because
some legitimate online applications would not
work properly if you did not have cookies
enabled. However, you may set the browser to
prompt before downloading/creating a cookie. - Set the browser security settings to medium or
high (it will prompt before downloading any files
(cookies, activeX controls, applets, spyware
etc.) and block pop-ups ) - May use software which checks for spyware and web
bugs - Limit the amount of information you enter on a
Web site - Create a designated junk mail e-mail, and give
only that e-mail to online sites requiring you to
provide e-mail (in order to purchase things, or
use online services)
32Security and Privacy in the Workplace
- Employee monitoring and surveillance are often
used in companies today to ensure network
security, manage productivity, and protect the
companys reputation - Companies should have an acceptable use policy
(AUP) that outlines what a computer may or may
not be used for - Employee Internet Management (EIM) software helps
employees monitor and report on employee
behavior, such as Internet use. - Employee monitoring and video surveillance tools
are legal - Maintaining security and privacy is a balancing
act
33(No Transcript)
34Summary
- Security concerns discussed in this chapter
include - System failure
- Securing online transactions and e-mail
- Privacy concerns surrounding computers include
- Collection of customer data for electronic
profiling - Spam
- Online activity tracking with cookies, spyware,
and Web bugs - A computer can be protected by
- using software or hardware tools (firewall,
antivirus software, automatic updates software), - set browser to use medium or high security
settings, - use strong passwords,
- set appropriate access controls (permissions)/
user privileges