SlideShare une entreprise Scribd logo
1  sur  23
AMERICAN SPY AGENCY WATCHING US 
Guided by 
Vishwadeep C. Badgujar 
Present by 
Kalyani V. Mali
Content 
 What is PRISM- NSA Surveillance 
 Goal of Seminar 
 Why its an issue 
 Major online company involvement 
 Effects of PRISM in our life 
 How to bypass internet Surveillance (tools) 
 Outcome
Goal of This Presentation 
 To aware Electronic spying program operated by other countries 
 Importance of our internet privacy 
 Types of data collected by PRISM – NS 
 How to Protect online Privacy and Data 
 How to Protect Corporate and Government electronic data 
 How we can bypass PRISM and another Spying Programs
What is PRISM NSA Surveillance
What is PRISM NSA Surveillance 
 PRISM is a clandestine mass electronic 
surveillance data mining program launched in 
2007 by the National Security Agency(NSA), with 
participation from an unknown date by the 
British equivalent agency, GCHQ
 The Prism program collects stored Internet 
communications based on demands made to 
Internet companies such as Google Inc. under 
Section 702 of the FISA Amendments Act of 
2008 to turn over any data that match court-approved 
search terms 
What is PRISM NSA Surveillance
 The NSA can use these Prism requests to target 
communications that were encrypted when 
they traveled across the Internet backbone. 
What is PRISM NSA Surveillance
Goal Behind PRISM
Goal Behind PRISM 
Having profile of each person on earth who is connected via any devices to network. It contains 
information about each person like: 
• Name, Address and Office address 
• How many bank accounts he owns and how much money he has in each of bank account. 
• What kind of job he does, researcher? Developer? Politician? etc. 
• His family and relation among other people. 
• His photo, his family photos 
• What does he speak more often? What is the content of his talks? 
• Whom he speaks to more often? 
• Where do you travel?
Goal Behind PRISM 
• A record of most calls made in the U.S 
• Email, Facebook posts and instant message 
• Massive amounts of raw Internet traffic 
• The contents of an unknown number of phone calls
Why its an issue ?
 Think, if CCTV surveillance cameras are fitted in your all house. And 
the recorded data stored and watch to another unknown place. 
 Then how you feel? Safe or Unsafe? 
 Are you feel secured ? 
 or you feel privacy lost ? 
Why its an Issue
Companies That Support NSA PRISM
Companies supports PRISM 
All Major American Internet Companies
Affects of NSA on our Privacy 
 NSA are continuously collect and analysis our data 
 NSA Collectects & Maintain following types of data 
 Our habits, where we travel, about our family 
 NSA can collect passwords of every online accounts 
 Our business details , sales details, targets etc 
 Call records, 
 The NSA monitors financial transactions. 
 The NSA intercepts troves of personal webcam video from innocent people. 
 Etc and more
How to bypass NSA surveillance 
N 
S 
A 
N 
S 
A
Tools 
 We need so tools and methods 
 Use proxy servers for confidential works 
 Use strong key AIS 256 bit for cloud data 
 Use Proxy Changer before surf on internet 
 Big organization can use VPN Services for protect there Networks 
 Corporate world can use disposal email for confidential email 
Bypassing PRISM
Bypassing PRISM - tools 
Tools 
Tor browser 
Proxy server in Japan 
Proxy server in Israel 
Proxy server in Russia 
Proxy server in Africa 
Proxy server in India 
Proxy server in Africa 
Encrypted browsing on internet
Bypassing PRISM - tools 
 DoNot Track browser plug-in 
 Prohibit internet companies to track you 
 Protect online traction tracking 
 cookies destructor browser plug-in 
 Best antivirus & anti malware
Use Private Search engine like 
Duduckgo.com 
Duduckgo never try to track you 
Bypassing PRISM - tools
 Use Private Cloud Storage like 
Spideroak 
Sperderoak never compromise our data 
Can only access by authorized device 
Bypassing PRISM - tools 
256 bit Encrypted
 Use only BBM 
Blackberry Massinger 
Protected with Triple DES 
3 Data Encryption Standards 
Never Compromise with NSA 
Bypassing PRISM - tools
Outcome of this presentation 
 For Business 
 Aware what Prism NSA surveillance spying 
 Available tools to bypass NSA surveillance 
 Protect confidential data by watching spy Agencies 
 Now businessman are confidant doing work on internet 
 For Private & Family 
 Importance of our online privacy 
 Methods how to leave secure and private on internet

Contenu connexe

Tendances

Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
"Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace""Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace"Dr. Sushma N Jogan
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibonJayed Hossain Jibon
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNetLockSmith
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to PreventShamiul Lajib
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityDEEKSHAASHOKA
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & HygineAmit Arya
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitysanjana mun
 
Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Jisc
 

Tendances (20)

Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
"Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace""Cyber crime- how to combat the menace"
"Cyber crime- how to combat the menace"
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Cyber Security & Hygine
Cyber Security & HygineCyber Security & Hygine
Cyber Security & Hygine
 
Cyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri LankaCyber security , an Analysis of State Security in Sri Lanka
Cyber security , an Analysis of State Security in Sri Lanka
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"Cyber Crime - "Who, What and How"
Cyber Crime - "Who, What and How"
 
Security Bytes - July 2013
Security Bytes -  July 2013Security Bytes -  July 2013
Security Bytes - July 2013
 

En vedette

PRiSM Practitioner
PRiSM PractitionerPRiSM Practitioner
PRiSM Practitionerasapm
 
PRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckPRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckDavid Coallier
 
2012 Coachmen Prism Class C Motorhome
2012 Coachmen Prism Class C Motorhome2012 Coachmen Prism Class C Motorhome
2012 Coachmen Prism Class C MotorhomeDave Arbogast RV
 
Mrs. folluo's prism project
Mrs. folluo's prism projectMrs. folluo's prism project
Mrs. folluo's prism projectdarenwolf
 
PRISM and Silverlight
PRISM and SilverlightPRISM and Silverlight
PRISM and Silverlightmark mann
 
Prism Credentials 2012
Prism  Credentials 2012Prism  Credentials 2012
Prism Credentials 2012Prism
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaKarin Wahl-Jorgensen
 
10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More Profit10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More ProfitWhatRunsWhere
 
Corporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligenceCorporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligenceMartin Brunet
 
FLAME Conference Program
FLAME Conference ProgramFLAME Conference Program
FLAME Conference ProgramLee Mordechai
 
Human as a virus
Human as a  virusHuman as a  virus
Human as a virusYaniv sela
 
Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio kennywhite
 
Why prism for xamarin.forms
Why prism for xamarin.formsWhy prism for xamarin.forms
Why prism for xamarin.formsAtsushi Nakamura
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 

En vedette (20)

PRiSM Practitioner
PRiSM PractitionerPRiSM Practitioner
PRiSM Practitioner
 
The Prism
The PrismThe Prism
The Prism
 
Ophthalmic prism
Ophthalmic prismOphthalmic prism
Ophthalmic prism
 
Prism.ppt
Prism.pptPrism.ppt
Prism.ppt
 
PRISM seed-stage Investor Deck
PRISM seed-stage Investor DeckPRISM seed-stage Investor Deck
PRISM seed-stage Investor Deck
 
2012 Coachmen Prism Class C Motorhome
2012 Coachmen Prism Class C Motorhome2012 Coachmen Prism Class C Motorhome
2012 Coachmen Prism Class C Motorhome
 
Mrs. folluo's prism project
Mrs. folluo's prism projectMrs. folluo's prism project
Mrs. folluo's prism project
 
PRISM and Silverlight
PRISM and SilverlightPRISM and Silverlight
PRISM and Silverlight
 
Prism Credentials 2012
Prism  Credentials 2012Prism  Credentials 2012
Prism Credentials 2012
 
Digital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: MediaDigital Citizenship and Surveillance Society: Media
Digital Citizenship and Surveillance Society: Media
 
10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More Profit10 Spying Strategies To Generate More Profit
10 Spying Strategies To Generate More Profit
 
Corporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligenceCorporate espionage versus competitive intelligence
Corporate espionage versus competitive intelligence
 
FLAME Conference Program
FLAME Conference ProgramFLAME Conference Program
FLAME Conference Program
 
Human as a virus
Human as a  virusHuman as a  virus
Human as a virus
 
Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio Cinema Volano - Programma Dicembre-Febbraio
Cinema Volano - Programma Dicembre-Febbraio
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Why prism for xamarin.forms
Why prism for xamarin.formsWhy prism for xamarin.forms
Why prism for xamarin.forms
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Stuxnet flame
Stuxnet flameStuxnet flame
Stuxnet flame
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 

Similaire à Vishwadeep Presentation On NSA PRISM Spying

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet- Mark - Fullbright
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyAEGILITY
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014Ghostery
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Insurance Technologies Corporation (ITC)
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationGriffin LaFleur
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyeBoost Consulting
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness trainingSandeep Taileng
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwordsBunmi Sowande
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats07Deeps
 
How can i hide my ip on permanent basis
How can i hide my ip on permanent basisHow can i hide my ip on permanent basis
How can i hide my ip on permanent basishidemyipaddress
 

Similaire à Vishwadeep Presentation On NSA PRISM Spying (20)

Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
A Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the InternetA Basic Guide to Safe Surfing on the Internet
A Basic Guide to Safe Surfing on the Internet
 
Protecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World SafetyProtecting Your Privacy: Cyberspace Security, Real World Safety
Protecting Your Privacy: Cyberspace Security, Real World Safety
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014Ghostery Data Privacy Day 2014
Ghostery Data Privacy Day 2014
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
 
018 CYBER SAFETY.pdf
018 CYBER SAFETY.pdf018 CYBER SAFETY.pdf
018 CYBER SAFETY.pdf
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentation
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
Protecting your online identity - Managing your passwords
Protecting your online identity -  Managing your passwordsProtecting your online identity -  Managing your passwords
Protecting your online identity - Managing your passwords
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
information, people $ threats
information, people $ threatsinformation, people $ threats
information, people $ threats
 
How can i hide my ip on permanent basis
How can i hide my ip on permanent basisHow can i hide my ip on permanent basis
How can i hide my ip on permanent basis
 

Dernier

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 

Dernier (20)

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 

Vishwadeep Presentation On NSA PRISM Spying

  • 1. AMERICAN SPY AGENCY WATCHING US Guided by Vishwadeep C. Badgujar Present by Kalyani V. Mali
  • 2. Content  What is PRISM- NSA Surveillance  Goal of Seminar  Why its an issue  Major online company involvement  Effects of PRISM in our life  How to bypass internet Surveillance (tools)  Outcome
  • 3. Goal of This Presentation  To aware Electronic spying program operated by other countries  Importance of our internet privacy  Types of data collected by PRISM – NS  How to Protect online Privacy and Data  How to Protect Corporate and Government electronic data  How we can bypass PRISM and another Spying Programs
  • 4. What is PRISM NSA Surveillance
  • 5. What is PRISM NSA Surveillance  PRISM is a clandestine mass electronic surveillance data mining program launched in 2007 by the National Security Agency(NSA), with participation from an unknown date by the British equivalent agency, GCHQ
  • 6.  The Prism program collects stored Internet communications based on demands made to Internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms What is PRISM NSA Surveillance
  • 7.  The NSA can use these Prism requests to target communications that were encrypted when they traveled across the Internet backbone. What is PRISM NSA Surveillance
  • 9. Goal Behind PRISM Having profile of each person on earth who is connected via any devices to network. It contains information about each person like: • Name, Address and Office address • How many bank accounts he owns and how much money he has in each of bank account. • What kind of job he does, researcher? Developer? Politician? etc. • His family and relation among other people. • His photo, his family photos • What does he speak more often? What is the content of his talks? • Whom he speaks to more often? • Where do you travel?
  • 10. Goal Behind PRISM • A record of most calls made in the U.S • Email, Facebook posts and instant message • Massive amounts of raw Internet traffic • The contents of an unknown number of phone calls
  • 11. Why its an issue ?
  • 12.  Think, if CCTV surveillance cameras are fitted in your all house. And the recorded data stored and watch to another unknown place.  Then how you feel? Safe or Unsafe?  Are you feel secured ?  or you feel privacy lost ? Why its an Issue
  • 14. Companies supports PRISM All Major American Internet Companies
  • 15. Affects of NSA on our Privacy  NSA are continuously collect and analysis our data  NSA Collectects & Maintain following types of data  Our habits, where we travel, about our family  NSA can collect passwords of every online accounts  Our business details , sales details, targets etc  Call records,  The NSA monitors financial transactions.  The NSA intercepts troves of personal webcam video from innocent people.  Etc and more
  • 16. How to bypass NSA surveillance N S A N S A
  • 17. Tools  We need so tools and methods  Use proxy servers for confidential works  Use strong key AIS 256 bit for cloud data  Use Proxy Changer before surf on internet  Big organization can use VPN Services for protect there Networks  Corporate world can use disposal email for confidential email Bypassing PRISM
  • 18. Bypassing PRISM - tools Tools Tor browser Proxy server in Japan Proxy server in Israel Proxy server in Russia Proxy server in Africa Proxy server in India Proxy server in Africa Encrypted browsing on internet
  • 19. Bypassing PRISM - tools  DoNot Track browser plug-in  Prohibit internet companies to track you  Protect online traction tracking  cookies destructor browser plug-in  Best antivirus & anti malware
  • 20. Use Private Search engine like Duduckgo.com Duduckgo never try to track you Bypassing PRISM - tools
  • 21.  Use Private Cloud Storage like Spideroak Sperderoak never compromise our data Can only access by authorized device Bypassing PRISM - tools 256 bit Encrypted
  • 22.  Use only BBM Blackberry Massinger Protected with Triple DES 3 Data Encryption Standards Never Compromise with NSA Bypassing PRISM - tools
  • 23. Outcome of this presentation  For Business  Aware what Prism NSA surveillance spying  Available tools to bypass NSA surveillance  Protect confidential data by watching spy Agencies  Now businessman are confidant doing work on internet  For Private & Family  Importance of our online privacy  Methods how to leave secure and private on internet