SlideShare une entreprise Scribd logo
1  sur  14
Information
Privacy and
Security
Presented By: Anu Mary Sunny (6030063)
Information
Privacy
• Legal or moral right
• The ability to control information
about oneself
• Ability to express selectively
• Privacy in IT also known as Data
Privacy
Information Types
TELEVISION EDUCATIONAL FINANCIAL INTERNET LOCATIONAL
MEDICAL POLITICAL
Laws and Authorities
• Each country has its own
privacy protection policies
Example: Office of the Australian
Information Commissioner(OAIC)
Privacy
Protocols
and
Algorithms
Fair Information Practices: A standard for
collecting and using personal data
The Platform for Privacy Preferences: it is a
protocol for websites
Anti-Tracking Source Location Privacy Protection
Protocol: Protection of data in sensor networks
ID3 Decision Tree: Based on Interference which
adds ransom value to actual data
Privacy
Protocols,
Technologies
and
Algorithms
(Contd..)
Distributed Data Mining: An
algorithm based on secure
multi-party computation
Privacy Enhancing Technologies:
Methods of data protection in
accordance with law
Information
Security
Methods used for the
protection of data
Principles are:
Confidentiality, Integrity
and Availability
Threats on digital information
Viruses Worms Phishing attacks Trojan horses Theft of intellectual
property
Identity theft
Sabotage Ransomware
Security
Enforcement
Access Control:Identification, Authorization, Authentication
Application Security: Antivirus,Secure Coding,
Encryption
Firewall
Intrusion detection System
Run Time Application Self Protection
Mobile Secure Gateway
Relation Between Privacy and Security
PRIVACY IS ABOUT SAFEGUARDING THE USER
WHEREAS SECURITY IS ABOUT PROTECTION
OF DATA
PRIVACY CANNOT EXIST WITHOUT SECURITY
WHEREAS SECURITY CAN EXIST WITHOUT
PRIVACY.
Concerns
Health care: protection of patient
records
Sensor Networks: Protection of huge
amount of data generated by sensors
Online Business: Protection of
consumer records and bank details
Social Media: Protection of personal
details and chat history of users
Conclusion
• The term Information privacy and security are
closely related, where privacy cannot exist
without security whereas security can exist
without privacy.
• The threats of information can be from hackers,
vulnerabilities in software, lack of transparency
in privacy policies, collection of unnecessary
data, personal data sharing, data transfer over
insecure channels etc.
• https://www.youtube.com/watch?v=6vNxslcf9A
E
References
Anthony D, M, Ana Fernandez 2001, ‘Consumer Perceptions of Privacy and Security Risks
for Online Shopping’, vol. 35, no. 1, pp. 27-44.
Dimitrova, A & Brkan, M 2018, ‘Balancing National Security and Data Protection: The
Role of EU and US Policy-Makers and Courts before and after the NSA Affair’, JCMS:
Journal of Common Market Studies, vol. 56, no. 4, pp. 751-67.
France Belanger & crossler, RE 2011, ‘Privacy in the Digital Age: A Review of Information
Privacy Research in InformationSystems’, MIS Quarterly, vol. 35, no. 4, pp. 1017-41.
Kagal L, FT, Joshi A, Greenspan S. 2006, ‘Security and Privacy Challenges in Open and
Dynamic Environments’, Computer, vol. 39, no. 6, pp. 89-91.
Li, C & Liu, H-w 2015, ‘A Review of Privacy Protection in E-commerce’, Journal of
Advanced Management Science, pp. 50-3.
Marci Meingast, TRSS 2006, ‘Security and Privacy Issues with Health Care Information
Technology’, in International Conference of the IEEE Engineering in Medicine and Biology
Society, New York, NY, USA.
Meng, X 2008, ‘Analyze and Prevent the Security Risks of E-Commerce Privacy’, paper
presented to 2008 International Conference on Management of e-Commerce and e-
Government.
References
Santosh Krishna Putchala, KB, R Anitha 2013, ‘Information
security challenges in social media interactions: strategies
to normalize practices across physical and virtual worlds’,
paper presented to DSCI - Best Practices Meet, Chennai,
India, 12-12 July 2013.
Weber, RH 2010, ‘Internet of Things – New security and
privacy challenges’, Computer Law & Security Review, vol.
26, no. 1, pp. 23-30.
Xin He, WPT 2017, ‘Multilayer Sensor Network for
Information Privacy’, in IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), New
Orleans, LA, USA.

Contenu connexe

Tendances

Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacyimehreenx
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Complianceaccenture
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theftAmber Gupta
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 

Tendances (20)

Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
Information Privacy
Information PrivacyInformation Privacy
Information Privacy
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 

Similaire à Information privacy and Security

Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard
 
hel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppthel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.pptgealehegn
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital HealthMegan Ranney
 
Examining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toExamining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toAli Zeinoddini Meymand
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 
Information policy ppt
Information policy pptInformation policy ppt
Information policy pptKabir Khan
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataArthit Suriyawongkul
 
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA
 
Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...ijistjournal
 
Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...ijistjournal
 
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaperRaúl van Riezen
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxadnis1
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...PacificResearchPlatform
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
Security of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxSecurity of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxkaylee7wsfdubill
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 

Similaire à Information privacy and Security (20)

Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard   Legally Compliant Use Of Personal Data In E Social ScienceChristopher Millard   Legally Compliant Use Of Personal Data In E Social Science
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
hel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppthel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppt
 
The Ethics of Digital Health
The Ethics of Digital HealthThe Ethics of Digital Health
The Ethics of Digital Health
 
Examining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related toExamining the Effect of Individual Differences and Concerns Related to
Examining the Effect of Individual Differences and Concerns Related to
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 
Information policy ppt
Information policy pptInformation policy ppt
Information policy ppt
 
DATA & PRIVACY PROTECTION Anna Monreale Università di Pisa
DATA & PRIVACY PROTECTION Anna Monreale Università di PisaDATA & PRIVACY PROTECTION Anna Monreale Università di Pisa
DATA & PRIVACY PROTECTION Anna Monreale Università di Pisa
 
Data Protection
 in the Age of Big Data
Data Protection
 in the Age of Big DataData Protection
 in the Age of Big Data
Data Protection
 in the Age of Big Data
 
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
 
Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...
 
Privacy and Surveillance
Privacy and SurveillancePrivacy and Surveillance
Privacy and Surveillance
 
Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...Submit Your Research Papers - International Journal of Information Sciences a...
Submit Your Research Papers - International Journal of Information Sciences a...
 
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Lesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptxLesson4-Privacy and Data Protection.pptx
Lesson4-Privacy and Data Protection.pptx
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
Security of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docxSecurity of Health Care RecordsWith the increase of health informa.docx
Security of Health Care RecordsWith the increase of health informa.docx
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 

Dernier

NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 

Dernier (20)

NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 

Information privacy and Security

  • 2. Information Privacy • Legal or moral right • The ability to control information about oneself • Ability to express selectively • Privacy in IT also known as Data Privacy
  • 3. Information Types TELEVISION EDUCATIONAL FINANCIAL INTERNET LOCATIONAL MEDICAL POLITICAL
  • 4. Laws and Authorities • Each country has its own privacy protection policies Example: Office of the Australian Information Commissioner(OAIC)
  • 5. Privacy Protocols and Algorithms Fair Information Practices: A standard for collecting and using personal data The Platform for Privacy Preferences: it is a protocol for websites Anti-Tracking Source Location Privacy Protection Protocol: Protection of data in sensor networks ID3 Decision Tree: Based on Interference which adds ransom value to actual data
  • 6. Privacy Protocols, Technologies and Algorithms (Contd..) Distributed Data Mining: An algorithm based on secure multi-party computation Privacy Enhancing Technologies: Methods of data protection in accordance with law
  • 7. Information Security Methods used for the protection of data Principles are: Confidentiality, Integrity and Availability
  • 8. Threats on digital information Viruses Worms Phishing attacks Trojan horses Theft of intellectual property Identity theft Sabotage Ransomware
  • 9. Security Enforcement Access Control:Identification, Authorization, Authentication Application Security: Antivirus,Secure Coding, Encryption Firewall Intrusion detection System Run Time Application Self Protection Mobile Secure Gateway
  • 10. Relation Between Privacy and Security PRIVACY IS ABOUT SAFEGUARDING THE USER WHEREAS SECURITY IS ABOUT PROTECTION OF DATA PRIVACY CANNOT EXIST WITHOUT SECURITY WHEREAS SECURITY CAN EXIST WITHOUT PRIVACY.
  • 11. Concerns Health care: protection of patient records Sensor Networks: Protection of huge amount of data generated by sensors Online Business: Protection of consumer records and bank details Social Media: Protection of personal details and chat history of users
  • 12. Conclusion • The term Information privacy and security are closely related, where privacy cannot exist without security whereas security can exist without privacy. • The threats of information can be from hackers, vulnerabilities in software, lack of transparency in privacy policies, collection of unnecessary data, personal data sharing, data transfer over insecure channels etc. • https://www.youtube.com/watch?v=6vNxslcf9A E
  • 13. References Anthony D, M, Ana Fernandez 2001, ‘Consumer Perceptions of Privacy and Security Risks for Online Shopping’, vol. 35, no. 1, pp. 27-44. Dimitrova, A & Brkan, M 2018, ‘Balancing National Security and Data Protection: The Role of EU and US Policy-Makers and Courts before and after the NSA Affair’, JCMS: Journal of Common Market Studies, vol. 56, no. 4, pp. 751-67. France Belanger & crossler, RE 2011, ‘Privacy in the Digital Age: A Review of Information Privacy Research in InformationSystems’, MIS Quarterly, vol. 35, no. 4, pp. 1017-41. Kagal L, FT, Joshi A, Greenspan S. 2006, ‘Security and Privacy Challenges in Open and Dynamic Environments’, Computer, vol. 39, no. 6, pp. 89-91. Li, C & Liu, H-w 2015, ‘A Review of Privacy Protection in E-commerce’, Journal of Advanced Management Science, pp. 50-3. Marci Meingast, TRSS 2006, ‘Security and Privacy Issues with Health Care Information Technology’, in International Conference of the IEEE Engineering in Medicine and Biology Society, New York, NY, USA. Meng, X 2008, ‘Analyze and Prevent the Security Risks of E-Commerce Privacy’, paper presented to 2008 International Conference on Management of e-Commerce and e- Government.
  • 14. References Santosh Krishna Putchala, KB, R Anitha 2013, ‘Information security challenges in social media interactions: strategies to normalize practices across physical and virtual worlds’, paper presented to DSCI - Best Practices Meet, Chennai, India, 12-12 July 2013. Weber, RH 2010, ‘Internet of Things – New security and privacy challenges’, Computer Law & Security Review, vol. 26, no. 1, pp. 23-30. Xin He, WPT 2017, ‘Multilayer Sensor Network for Information Privacy’, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, USA.