SlideShare une entreprise Scribd logo
Digital Identity
What is it?
Thouraya.daouas@ihec.rnu.tn
Dr. Thouraya Daouas
Digital identity
• The set of activities you do on Internet contributes in
defining your digital identity.
• It’s constructed by many elements:
– Personal data associated with your profile.
– Information you publish on Internet.
– Information about you that others publish.
– Tracks you leave consciously or not.
• User can have three types of identifier:
– Professional or institutional related to a professional activity.
– Private identifiers for personal use (social network, online selling,
mail, online banking, etc.)
Dr. Thouraya Daouas 2Digital Identity
Digital identity
• How to master it?
– User should choose sensibly its identifier to be used
according to his activity;
– User limits the access to the information which he
publishes;
– User checks regularly his image on Web or e-
reputation.
Dr. Thouraya Daouas 3Digital Identity
Authentification
• Procedure which checks that the information
about connection supplied is correct (identifier
and password, fingerprints, etc.).
• Some rules are important to respect:
– Keep secret the password.
– Choose a complex password (Combining necessarily
small letters, capital letters, numbers and symbols).
Should not have evident meaning.
– Should not usurp an identity.
Dr. Thouraya Daouas 4Digital Identity
Configuration of profile
• Connection identifier can be associated to a profile
containing photos, personal information and
preferences.
• It is possible to configure information access:
– Public: accessible for everyone and referenced in search
engines.
– Restricted: accessible for authorized community and not
referenced.
• In case of emails, a signature could be put at the end of the
email body or a visit card could be joint to the email.
Dr. Thouraya Daouas 5Digital Identity
Digital tracks
• What could we find in the file properties?
– Date, Time, Author name, Revision number, Camera model, etc.
• What can we know about the user identity?
– Each connected computer has an IP address given to user by the
Internet service provider which has to keep during one year the list of
connections and the information allowing to identify the Internet
user.
– When we consult a web page, the browser sends a request to the
server to get back the data (texts, images, etc.) to download. Server
can keep track and follow so the browsing on the site.
– In email header are stored a series of IP addresses describing servers
which can supply indications on sender geographical localization.
Dr. Thouraya Daouas 6Digital Identity
e-Reputation
• e-Reputation or digital reputation is the image can be made
of a person through the Web.
• We must be aware that:
– Everybody can publish on Web without any control: on a blog or a
social network, by participating in a discussion forum, by publishing a
site to a host, etc.
– We loose the control of an information published with a " public
access ": from the moment where an information is public, it can be
indexed by search engines and copied out in their mask memory. It
can put several months disappearing.
Dr. Thouraya Daouas 7Digital Identity

Contenu connexe

Tendances

Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
Joanna Dimitrova
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
Deepak Kumar (D3)
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
Charles Cline
 
Your digital identity
Your digital identityYour digital identity
Your digital identity
TC Techies
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
OSI Layer Security
OSI Layer SecurityOSI Layer Security
OSI Layer Security
Nurkholish Halim
 
Identity theft
Identity theftIdentity theft
Identity theft
Eqhball Ghazizadeh
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
SANTANU KUMAR DAS
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
NetLockSmith
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
EC-Council
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Password management
Password managementPassword management
Password management
Wilmington University
 
Phishing
PhishingPhishing
Identity Theft
Identity Theft Identity Theft
Identity Theft
Fairfax County
 

Tendances (20)

Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Cyber Forensics & Challenges
Cyber Forensics & ChallengesCyber Forensics & Challenges
Cyber Forensics & Challenges
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Your digital identity
Your digital identityYour digital identity
Your digital identity
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
OSI Layer Security
OSI Layer SecurityOSI Layer Security
OSI Layer Security
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) PostersNat'l Cyber Security Awareness Month (NCSAM) Posters
Nat'l Cyber Security Awareness Month (NCSAM) Posters
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Cybersecurity Audit
Cybersecurity AuditCybersecurity Audit
Cybersecurity Audit
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Password management
Password managementPassword management
Password management
 
Phishing
PhishingPhishing
Phishing
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 

Similaire à Digital identity

DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
T Tanujha
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
Iulia Porneala
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
DeepasreeBiju
 
Web services
Web servicesWeb services
Web services
Himanshu Pathak
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
TeenaSharma73
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
TeenaSharma73
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
Nano894860
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
TuhinUtsabPaul
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
Sifat Hossain
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
nikitaTahilyani1
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
Kirti Verma
 
20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]
Alex Hung
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
Kirsten Thompson
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
lapao2014
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
Riya Gupta
 

Similaire à Digital identity (20)

DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
 
How you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNsHow you can protect your online identity, online privacy and VPNs
How you can protect your online identity, online privacy and VPNs
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Web services
Web servicesWeb services
Web services
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
 
Computer Science – societal impact.pptx
Computer Science – societal impact.pptxComputer Science – societal impact.pptx
Computer Science – societal impact.pptx
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Ethics,security and privacy control
Ethics,security and privacy controlEthics,security and privacy control
Ethics,security and privacy control
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]20131030 hkpasea presentation[1]
20131030 hkpasea presentation[1]
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
SERVICES ON THE INTERNET
SERVICES ON THE INTERNETSERVICES ON THE INTERNET
SERVICES ON THE INTERNET
 

Plus de Thouraya Daouas

Fish philosophie
Fish philosophieFish philosophie
Fish philosophie
Thouraya Daouas
 
Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020
Thouraya Daouas
 
Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.
Thouraya Daouas
 
Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019
Thouraya Daouas
 
De la craie au virtuel
De la craie au virtuelDe la craie au virtuel
De la craie au virtuel
Thouraya Daouas
 
La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.
Thouraya Daouas
 
Work flow
Work flowWork flow
Work flow
Thouraya Daouas
 
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissageLe virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Thouraya Daouas
 
Plateforme uvt c2i
Plateforme uvt c2iPlateforme uvt c2i
Plateforme uvt c2i
Thouraya Daouas
 
Plateforme e circle
Plateforme e circlePlateforme e circle
Plateforme e circle
Thouraya Daouas
 

Plus de Thouraya Daouas (10)

Fish philosophie
Fish philosophieFish philosophie
Fish philosophie
 
Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020Pich aux LUDOVIALES 2020
Pich aux LUDOVIALES 2020
 
Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.Présentation d'une communication acceptée dans ICERI2018.
Présentation d'une communication acceptée dans ICERI2018.
 
Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019Présentation d'une communication acceptée dans Iceri2019
Présentation d'une communication acceptée dans Iceri2019
 
De la craie au virtuel
De la craie au virtuelDe la craie au virtuel
De la craie au virtuel
 
La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.La place de la technologie dans l'enseignement: Le changement a eu lieu.
La place de la technologie dans l'enseignement: Le changement a eu lieu.
 
Work flow
Work flowWork flow
Work flow
 
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissageLe virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
Le virtuel dans l’enseignement exploiter le ‘e’ pour améliorer l’apprentissage
 
Plateforme uvt c2i
Plateforme uvt c2iPlateforme uvt c2i
Plateforme uvt c2i
 
Plateforme e circle
Plateforme e circlePlateforme e circle
Plateforme e circle
 

Dernier

Transportation_Channel_Investor_Presentation_April_2024_ Final .pdf
Transportation_Channel_Investor_Presentation_April_2024_ Final .pdfTransportation_Channel_Investor_Presentation_April_2024_ Final .pdf
Transportation_Channel_Investor_Presentation_April_2024_ Final .pdf
Matthewperry105
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
AJHSSR Journal
 
Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........
SocioCosmos
 
Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
SocioCosmos
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
9u4xjk4w
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
Charles Bayless
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
7lkkjxt
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
urbhattiacademy
 

Dernier (13)

Transportation_Channel_Investor_Presentation_April_2024_ Final .pdf
Transportation_Channel_Investor_Presentation_April_2024_ Final .pdfTransportation_Channel_Investor_Presentation_April_2024_ Final .pdf
Transportation_Channel_Investor_Presentation_April_2024_ Final .pdf
 
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMSTUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISM
 
Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........Maximize Your Twitch Potential!..........
Maximize Your Twitch Potential!..........
 
Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
 
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
快速办理(worcester毕业证书)伍斯特大学毕业证PDF成绩单一模一样
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
 
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
原版制作(Hull毕业证书)赫尔大学毕业证Offer一模一样
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdfUR BHATTI ACADEMY AND ONLINE COURSES.pdf
UR BHATTI ACADEMY AND ONLINE COURSES.pdf
 

Digital identity

  • 1. Digital Identity What is it? Thouraya.daouas@ihec.rnu.tn Dr. Thouraya Daouas
  • 2. Digital identity • The set of activities you do on Internet contributes in defining your digital identity. • It’s constructed by many elements: – Personal data associated with your profile. – Information you publish on Internet. – Information about you that others publish. – Tracks you leave consciously or not. • User can have three types of identifier: – Professional or institutional related to a professional activity. – Private identifiers for personal use (social network, online selling, mail, online banking, etc.) Dr. Thouraya Daouas 2Digital Identity
  • 3. Digital identity • How to master it? – User should choose sensibly its identifier to be used according to his activity; – User limits the access to the information which he publishes; – User checks regularly his image on Web or e- reputation. Dr. Thouraya Daouas 3Digital Identity
  • 4. Authentification • Procedure which checks that the information about connection supplied is correct (identifier and password, fingerprints, etc.). • Some rules are important to respect: – Keep secret the password. – Choose a complex password (Combining necessarily small letters, capital letters, numbers and symbols). Should not have evident meaning. – Should not usurp an identity. Dr. Thouraya Daouas 4Digital Identity
  • 5. Configuration of profile • Connection identifier can be associated to a profile containing photos, personal information and preferences. • It is possible to configure information access: – Public: accessible for everyone and referenced in search engines. – Restricted: accessible for authorized community and not referenced. • In case of emails, a signature could be put at the end of the email body or a visit card could be joint to the email. Dr. Thouraya Daouas 5Digital Identity
  • 6. Digital tracks • What could we find in the file properties? – Date, Time, Author name, Revision number, Camera model, etc. • What can we know about the user identity? – Each connected computer has an IP address given to user by the Internet service provider which has to keep during one year the list of connections and the information allowing to identify the Internet user. – When we consult a web page, the browser sends a request to the server to get back the data (texts, images, etc.) to download. Server can keep track and follow so the browsing on the site. – In email header are stored a series of IP addresses describing servers which can supply indications on sender geographical localization. Dr. Thouraya Daouas 6Digital Identity
  • 7. e-Reputation • e-Reputation or digital reputation is the image can be made of a person through the Web. • We must be aware that: – Everybody can publish on Web without any control: on a blog or a social network, by participating in a discussion forum, by publishing a site to a host, etc. – We loose the control of an information published with a " public access ": from the moment where an information is public, it can be indexed by search engines and copied out in their mask memory. It can put several months disappearing. Dr. Thouraya Daouas 7Digital Identity