1 of 18

Slide Notes

DownloadGo Live

Online Privacy and Security

Published on Nov 20, 2015

No Description


Online Privacy and Security

sadia hasan & zaynab shirazie

information security

online identity, cookies & online privacy

information security: online identity

  • Online Identity is your social identity that is present online and is a representation of yourself
  • Facebook, Instagram, Twitter, and Tumblr are just a few examples of social interactive websites that allow you to create an online identity
  • Your online identity can be anonymous or public


online identity pros and cons

  • Pros: able to be yourself more comfortably (alter ego), freely express your views on certain topics, keeping your professional identity separate from your personal identity,
  • Cons: keeping track of multiple usernames/identities is challenging, knowing where to draw the line with online posts/comments

information security: cookies

  • Cookies are small pieces of data that is sent from the websites you visit to track your activity online and what your interests are

cookies: pros and cons

  • Pros: They save your username/password information making it faster to log on/purchase items online, you are offered products or services that are tailored to your previous activity online, easy to manage which cookies you want enabled
  • Cons: some may feel as though it is a violation of privacy, security breaches have been found in which important information have been stolen

information security: online privacy

  • Some personal information should be just that; personal.
  • Be mindful of what type of social media you are on
  • Facebook has more security as opposed to Tumblr which is public

online privacy cont'd

  • Credit card information, usernames and passwords, home addresses and other like information should not be shared on any online platform because cookies can store this information

intellectual property

challenges & solutions

intellectual property: challenges

  • Posting your original work online can be beneficial
  • You are able to create an online following that appreciates your work
  • The major problem stems from others claiming your work as their own

intellectual property: solutions

  • Copyright laws can be used for written work and music
  • Trademarks can be used on slogans and symbols
  • Patents are used on inventions
  • These preventative measures protect you from theft by verifying the creative content as your own and hold in the court of law

cyber security

cyber bullying, cyber crime & staying safe

cyber security: cyber bullying

  • Cyber bullying is a form of improper netiquette that effects millions of people
  • Online identities can be used in a negative way to hurt others
  • Hiding behind the anonymity of a screen name and saying what you please without any consequences is wrong
  • In many cases, cyber bullying has lead to depression, self harming, and suicide.

cyber security: cyber crime

  • Cyber crime involves the use of the internet to threaten a person's life, steal money and sensitive information
  • In many times this includes hacking into their personal computers and stealing their private information
  • Identity theft can also be a result of computer hacking

Cyber crime cont'd

  • Trojan horses create back doors on your computer to send out information
  • Worms can work remotely and spread to other computers on the same network
  • Spoofing involves dummy sites that are similar to your regular sites to trick you into giving out your information
  • These are all dangerous forms of viruses

cyber security: staying safe

  • Using web browsers such as Google Chrome, installing anti virus software, not clicking on unknown emails, using complicated passwords, searching with duckduckgo.com, encryption software (myshadow.org

thank you