0% found this document useful (1 vote)
390 views41 pages

ETHICS Presentation 3

This document discusses various types of anonymity and privacy. It describes pseudo identities, untraceable identities, and pseudo addresses that allow anonymous communication. It also outlines different channels for anonymous acts on the internet like anonymous servers and anonymous users. The document then discusses advantages and disadvantages of anonymity, as well as concepts related to privacy like personal privacy, communications privacy, and data privacy. It provides examples of privacy violations through intrusion, misuse of information, and interception of information.

Uploaded by

ilaksh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
390 views41 pages

ETHICS Presentation 3

This document discusses various types of anonymity and privacy. It describes pseudo identities, untraceable identities, and pseudo addresses that allow anonymous communication. It also outlines different channels for anonymous acts on the internet like anonymous servers and anonymous users. The document then discusses advantages and disadvantages of anonymity, as well as concepts related to privacy like personal privacy, communications privacy, and data privacy. It provides examples of privacy violations through intrusion, misuse of information, and interception of information.

Uploaded by

ilaksh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

Anonymity

Anonymity is being nameless, having no identity.


There are types of anonymity that people usually use.
types of anonymity
Pseudo identity
Untraceable identity
Anonymity with a pseudo address to receive and send
correspondence with others
Pseudo identity
Pseudo identity: An individual is identified by a certain
pseudonym, code, or number (compare with a writers
pen name). This is referred to as pseudo anonymity. It
is used frequently in the witness protection program.
This is the most common variant of anonymity.
Untraceable identity
Untraceable identity: One is not known by any name
including pseudo names.
to receive and send
correspondence with others

Anonymity with a pseudo address to receive and send


correspondence with others: This technique is popular
with people using anonymous remailers, user groups,
and news groups.
Anonymity and the Internet

The nature of the Internet, with its lack of political,


cultural, religious, and judicial boundaries, has
created a fertile ground for all faceless people to come
out in the open. In particular, the Internet provides
two channels through which anonymous acts can be
carried out
two channels through which
anonymous acts can be carried out
Anonymous servers
Anonymous users
Anonymous servers

With advances in software and hardware, anonymity


on the Internet has grown through anonymous
servers. There are two types of anonymity servers:
Full anonymity servers
Pseudonymous servers
Anonymous servers
Full anonymity servers, where no identifying
information is forwarded in packet headers
Pseudonymous servers, which put pseudonym in
forwarded packet headers, keeping the real identity
behind a pseudonym, but being able to receive and
forward all packets sent to the pseudonym to the real
server
Anonymous users
Anonymous users: Another Internet channel to
assure anonymity is for users to assume pseudonyms
and use internet services such as bulletin boards, chat
rooms and social online networks anonymously.
Advantages:

Anonymity is good when a whistle-blower uses it to check


unhealthy activities within the organization. Although
whistle-blowers are controversial, they are good in a
number of cases especially when there is abuse of office
and resources.
Anonymity is good in case of national security. So
underground spies can gather information that is good for
national defence.
Where there is intimidation and fear of reprisals,
anonymity is good because useful information may be
revealed.
Anonymity is good for some relationships and the security
of some people.
Disadvantages:

Criminals and embezzlers can use it to their


advantage, especially in online social networks.
Lots of disputes could be solved if information from
individual party to these disputes can reveal the
necessary information.
Security

In general, security can be considered a means to


prevent unauthorized access, use, alteration, and theft
or physical damage to property.
Elements of Security
Confidentiality
Integrity
Availability
Confidentiality:
To prevent unauthorized disclosure of information to
third parties. This is important in a number of areas
including the disclosure of personal information such
as medical, financial, academic, and criminal records.
Integrity:
To prevent unauthorized modification of files and
maintain the status quo. It includes system,
information, and personnel integrity. The alteration of
information may be caused by a desire for personal
gain or a need for revenge.
Availability:
To prevent unauthorized withholding of information
from those who need it when they need it.
Physical Security
A facility is physically secure if it is surrounded by a
barrier such as a fence, has secure areas both inside
and outside the facility, and can resist penetration by
intruders. Physical security can be guaranteed if the
following four mechanisms are in place: deterrence,
prevention, detection, and response.
Deterrence:
To try to defend systems against intruders who may try
to gain access. It works by creating an atmosphere
intended to scare intruders.
Prevention:
Used in mechanisms that work by trying to stop
intruders from gaining access.
Detection:
This mechanism assumes the intruder has succeeded
or is in the process of gaining access to the system. So
it tries to see that intruder who has gained or who is
trying to gain access.
Response
Response is an after effect mechanism that tries to
respond to the failure of the first three mechanisms. It
works by trying to stop and/or prevent damage or
access to a facility.
Physical Security Barriers
The physical barrier can be a fence made of barbed
wire, brick walls, natural trees, mounted noise or
vibration sensors, security lighting, close circuit
television (CCTV), buried seismic sensors, or different
photoelectric and microwave systems. The area
surrounding the facility can be secured using locks
and keys, window breakage detectors, infrared and
ultrasonic detectors, interior microwave systems,
animal like dogs, and human barriers like security
guards and others.
Electronic Access Controls

With advances in technology, we are moving away,


though not totally, from the physical barriers to more
invasive electronic controls that include card access
control systems and firewalls, password, encryption,
data backups, intrusion detection programs and other
authorization programs.
Privacy
Privacy is the claim of individuals to be left alone, free
from surveillance or interference from other
individuals or organizations, including the state.
Claims to privacy are also involved at the workplace:
Millions of employees are subject to electronic and
other forms of high-tech surveillance.
elements of privacy right
Solitude : The right to be alone without disturbances
Anonymity : The right to have no public personal
identity
Intimacy : The right not to be monitored
Reserve: The right to control ones personal
information including the methods of dissemination
of that information.
threats of Privacy
Intentional, institutional uses of personal information (in
the government sector primarily for law enforcement and
tax collection, and in the private sector primarily for
marketing and decision making)
Unauthorized use or release by insiders, - the people
who maintain the information.
Theft of information
Inadvertent leakage of information through negligence
or carelessness
Our own actions (sometimes intentional trade-offs and
sometimes when we are unaware of the risks).
Types of Privacy

Personal Privacy
Communications Privacy
Data Privacy
Information Privacy
Personal Privacy

This type of privacy involves the privacy of personal


attributes. The right to privacy of all personal
attributes would mean the prevention of anyone or
anything that would intrude or violate that personal
space where those attributes are. This would include
all types of intrusions including physical searches,
video recording, and surveillance of any type.
Communications Privacy

Communications privacy involves the ability to


communicate with others without those
communications being monitored by other persons or
organizations.

Data Privacy

Data privacy is concern with the ability to limit access


to ones personal data by other individuals and
organizations in order to exercise a substantial degree
of control over that data and its use.
Information Privacy

Information Privacy is the combination of


communications privacy and data privacy.
There are different strands of information that we have
to protect including: Financial information, medical
information, personal information, and internet
information.

numerous contributing factors or


causes of violations of privacy
Consumers willingly give up information about themselves
when they register at Web sites, and in mailing
solicitations.
Consumers lack the knowledge of how what they consider
a little bit of information can turn into a big invasion of
privacy.
Inadequate privacy policies.
Failure of companies and institutions to follow their own
privacy policies.
Internet temptation that enables businesses to reach
individuals in a very short time in the privacy of their
homes and offices.

Some privacy violations


Intrusion
Misuse of Information
Interception of Information
At the source and sink of information
Between communication channels
Intrusion

Intrusion is an invasion of privacy by wrongful entry,


seizing, or acquiring possession of the property of
others. For example, hackers are intruders because
they wrongfully break into computer systems whether
they cause damage or not. With computer network,
intrusion is growing fast.
Misuse of Information

People continually give out information in exchange for


services. Businesses and governments collect this
information from us honestly to provide services
effectively. The information collected, is not just collected
only to be stored. This information is digital gold to these
companies. They mine the gold from us and sell it to the
highest bidder. There is nothing wrong with collecting
personal information when it is going to be used for a
legitimate reason; for the purpose it was intended.
However, the problem arises when this information is used
for unauthorized purposes; collecting this information
then becomes an invasion of privacy.
Interception of Information

Interception of information is unauthorized access to


private information via eavesdropping, which occurs
when a third party gains unauthorized access to a
private communication between two or more parties.
Information can be gathered by eavesdropping in the
following areas:
At the source and sink of
information
At the source and sink of information, where either
client or server intrusion software can listen in, collect
information, and send it back to the sender.
Between communication channels
Between communication channels by tapping into the
communication channels and then listening in.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy