Module 4 - Information Privacy and Computer Network Security
Module 4 - Information Privacy and Computer Network Security
Michael J. Quinn
Chapter 5:
Privacy
by
Michael J. Quinn
Defining Privacy
• Privacy related to notion of access
• Access
– Physical proximity to a person
– Knowledge about a person
• Edmund Byrne: Privacy is a “zone of
inaccessibility”
• Edward Bloustein: Privacy violations are an
affront to human dignity
1-3
5-3
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Harms of Privacy
1-4
5-4
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Benefits of Privacy
• Individual growth (maturity)
• Individual responsibility
• Freedom to be yourself
• Intellectual and spiritual growth
– Shut out the rest of the world to focus our
thoughts without interruption.
• Development of loving, trusting, caring,
intimate relationships
– Close relationships
1-5
5-5
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Is There a Natural Right to Privacy?
1-6
5-6
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Disclosing Information
• Public record: information for public access
– Ex: birth certificates
• Public information: information revealed to an
organization that has right to share it
– Ex: Telephone directory
• Personal information: undisclosed information
– Ex: religion, wealth
• Types of disclosures
– Voluntary :
– Involuntary : body and luggage search at airport
– Statutory : Record of arrests and convicted persons
• Cameras on streets
1-7
5-7
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
1-8
1-8
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Who stores data about you?
1-9
1-10
Data Money
1-11
1-12
• Data Subjects
– Refers to an individual whose, sensitive personal, or privileged information is processed personal
1-13
Personal Information:
Personal information refers to any
information whether recorded in a material
form or not, from which the identity of an
individual is apparent or can be reasonably
and directly ascertained by the entity
holding the information, or when put
together with other information would
directly and certainly identify an individual.
1-16
Principle of Transparency
A data subject must be aware of the nature, purpose, and extent of the processing of his or
her personal data, including the risks and safeguards involved, the identity of personal
information controller, his or her rights as a data subject, and how these can be exercised.
Any information and communication relating to the processing of personal data should be
easy to access and understand, using clear and plain language.
1-20
1-21
Principle of Proportionality
The processing of information shall be adequate, relevant, suitable, necessary, and not
excessive in relation to a declared and specified purpose. Personal data shall be
processed only if the purpose of the processing could not reasonably be fulfilled by
other means.
1-22
1-23
1-25
1-26
1-26
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Chapter 6:
Computer and Network Security
by
Michael J. Quinn
Introduction
6-28
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Viruses (1/2)
6-29
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Viruses (2/2)
• Well-known viruses
– Brain
– Michelangelo
– Melissa
– Love Bug
• Viruses today
– Commercial antivirus software
– Few people keep up-to-date
1-30
6
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley -
1-31
1-31
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
1-32
1-32
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Worms
• Worm
– Self-contained program
– Spreads through a computer network
– Exploits security holes in networked computers
1-33
6-33
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
1-34
1-34
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Trojan Horses
• Trojan horse virus, also called trojan, may be defined as malware
that appears to be legitimate or appropriate software and used by
attackers to compromise the system’s security.
1-35
1-35
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Defensive Measures
6-36
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
1-37
1-37
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
1-38
1-38
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Hackers
1-39
6-39
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Phone Phreaking
6-40
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
1-41
1-41
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley
Penalties for Hacking
• Examples of illegal activities
– Accessing without authorization any Internet
computer
– Transmitting a virus or worm
– Trafficking in computer passwords
– Accessing stored email messages without
authorization
– Adopting another identity to carry out an illegal
activity
• Maximum penalty: 20 years in prison + $250,000
fine
1-42
6-42
Copyright © Pearson Education, Inc. Publishing as Pearson Addison-Wesley