This document discusses various types of anonymity and privacy. It describes pseudo identities, untraceable identities, and pseudo addresses that allow anonymous communication. It also outlines different channels for anonymous acts on the internet like anonymous servers and anonymous users. The document then discusses advantages and disadvantages of anonymity, as well as concepts related to privacy like personal privacy, communications privacy, and data privacy. It provides examples of privacy violations through intrusion, misuse of information, and interception of information.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0%(1)0% found this document useful (1 vote)
390 views41 pages
ETHICS Presentation 3
This document discusses various types of anonymity and privacy. It describes pseudo identities, untraceable identities, and pseudo addresses that allow anonymous communication. It also outlines different channels for anonymous acts on the internet like anonymous servers and anonymous users. The document then discusses advantages and disadvantages of anonymity, as well as concepts related to privacy like personal privacy, communications privacy, and data privacy. It provides examples of privacy violations through intrusion, misuse of information, and interception of information.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41
Anonymity
Anonymity is being nameless, having no identity.
There are types of anonymity that people usually use. types of anonymity Pseudo identity Untraceable identity Anonymity with a pseudo address to receive and send correspondence with others Pseudo identity Pseudo identity: An individual is identified by a certain pseudonym, code, or number (compare with a writers pen name). This is referred to as pseudo anonymity. It is used frequently in the witness protection program. This is the most common variant of anonymity. Untraceable identity Untraceable identity: One is not known by any name including pseudo names. to receive and send correspondence with others
Anonymity with a pseudo address to receive and send
correspondence with others: This technique is popular with people using anonymous remailers, user groups, and news groups. Anonymity and the Internet
The nature of the Internet, with its lack of political,
cultural, religious, and judicial boundaries, has created a fertile ground for all faceless people to come out in the open. In particular, the Internet provides two channels through which anonymous acts can be carried out two channels through which anonymous acts can be carried out Anonymous servers Anonymous users Anonymous servers
With advances in software and hardware, anonymity
on the Internet has grown through anonymous servers. There are two types of anonymity servers: Full anonymity servers Pseudonymous servers Anonymous servers Full anonymity servers, where no identifying information is forwarded in packet headers Pseudonymous servers, which put pseudonym in forwarded packet headers, keeping the real identity behind a pseudonym, but being able to receive and forward all packets sent to the pseudonym to the real server Anonymous users Anonymous users: Another Internet channel to assure anonymity is for users to assume pseudonyms and use internet services such as bulletin boards, chat rooms and social online networks anonymously. Advantages:
Anonymity is good when a whistle-blower uses it to check
unhealthy activities within the organization. Although whistle-blowers are controversial, they are good in a number of cases especially when there is abuse of office and resources. Anonymity is good in case of national security. So underground spies can gather information that is good for national defence. Where there is intimidation and fear of reprisals, anonymity is good because useful information may be revealed. Anonymity is good for some relationships and the security of some people. Disadvantages:
Criminals and embezzlers can use it to their
advantage, especially in online social networks. Lots of disputes could be solved if information from individual party to these disputes can reveal the necessary information. Security
In general, security can be considered a means to
prevent unauthorized access, use, alteration, and theft or physical damage to property. Elements of Security Confidentiality Integrity Availability Confidentiality: To prevent unauthorized disclosure of information to third parties. This is important in a number of areas including the disclosure of personal information such as medical, financial, academic, and criminal records. Integrity: To prevent unauthorized modification of files and maintain the status quo. It includes system, information, and personnel integrity. The alteration of information may be caused by a desire for personal gain or a need for revenge. Availability: To prevent unauthorized withholding of information from those who need it when they need it. Physical Security A facility is physically secure if it is surrounded by a barrier such as a fence, has secure areas both inside and outside the facility, and can resist penetration by intruders. Physical security can be guaranteed if the following four mechanisms are in place: deterrence, prevention, detection, and response. Deterrence: To try to defend systems against intruders who may try to gain access. It works by creating an atmosphere intended to scare intruders. Prevention: Used in mechanisms that work by trying to stop intruders from gaining access. Detection: This mechanism assumes the intruder has succeeded or is in the process of gaining access to the system. So it tries to see that intruder who has gained or who is trying to gain access. Response Response is an after effect mechanism that tries to respond to the failure of the first three mechanisms. It works by trying to stop and/or prevent damage or access to a facility. Physical Security Barriers The physical barrier can be a fence made of barbed wire, brick walls, natural trees, mounted noise or vibration sensors, security lighting, close circuit television (CCTV), buried seismic sensors, or different photoelectric and microwave systems. The area surrounding the facility can be secured using locks and keys, window breakage detectors, infrared and ultrasonic detectors, interior microwave systems, animal like dogs, and human barriers like security guards and others. Electronic Access Controls
With advances in technology, we are moving away,
though not totally, from the physical barriers to more invasive electronic controls that include card access control systems and firewalls, password, encryption, data backups, intrusion detection programs and other authorization programs. Privacy Privacy is the claim of individuals to be left alone, free from surveillance or interference from other individuals or organizations, including the state. Claims to privacy are also involved at the workplace: Millions of employees are subject to electronic and other forms of high-tech surveillance. elements of privacy right Solitude : The right to be alone without disturbances Anonymity : The right to have no public personal identity Intimacy : The right not to be monitored Reserve: The right to control ones personal information including the methods of dissemination of that information. threats of Privacy Intentional, institutional uses of personal information (in the government sector primarily for law enforcement and tax collection, and in the private sector primarily for marketing and decision making) Unauthorized use or release by insiders, - the people who maintain the information. Theft of information Inadvertent leakage of information through negligence or carelessness Our own actions (sometimes intentional trade-offs and sometimes when we are unaware of the risks). Types of Privacy
Personal Privacy Communications Privacy Data Privacy Information Privacy Personal Privacy
This type of privacy involves the privacy of personal
attributes. The right to privacy of all personal attributes would mean the prevention of anyone or anything that would intrude or violate that personal space where those attributes are. This would include all types of intrusions including physical searches, video recording, and surveillance of any type. Communications Privacy
Communications privacy involves the ability to
communicate with others without those communications being monitored by other persons or organizations.
Data Privacy
Data privacy is concern with the ability to limit access
to ones personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use. Information Privacy
Information Privacy is the combination of
communications privacy and data privacy. There are different strands of information that we have to protect including: Financial information, medical information, personal information, and internet information.
numerous contributing factors or
causes of violations of privacy Consumers willingly give up information about themselves when they register at Web sites, and in mailing solicitations. Consumers lack the knowledge of how what they consider a little bit of information can turn into a big invasion of privacy. Inadequate privacy policies. Failure of companies and institutions to follow their own privacy policies. Internet temptation that enables businesses to reach individuals in a very short time in the privacy of their homes and offices.
Some privacy violations
Intrusion Misuse of Information Interception of Information At the source and sink of information Between communication channels Intrusion
Intrusion is an invasion of privacy by wrongful entry,
seizing, or acquiring possession of the property of others. For example, hackers are intruders because they wrongfully break into computer systems whether they cause damage or not. With computer network, intrusion is growing fast. Misuse of Information
People continually give out information in exchange for
services. Businesses and governments collect this information from us honestly to provide services effectively. The information collected, is not just collected only to be stored. This information is digital gold to these companies. They mine the gold from us and sell it to the highest bidder. There is nothing wrong with collecting personal information when it is going to be used for a legitimate reason; for the purpose it was intended. However, the problem arises when this information is used for unauthorized purposes; collecting this information then becomes an invasion of privacy. Interception of Information
Interception of information is unauthorized access to
private information via eavesdropping, which occurs when a third party gains unauthorized access to a private communication between two or more parties. Information can be gathered by eavesdropping in the following areas: At the source and sink of information At the source and sink of information, where either client or server intrusion software can listen in, collect information, and send it back to the sender. Between communication channels Between communication channels by tapping into the communication channels and then listening in.