SlideShare a Scribd company logo
2
Most read
4
Most read
7
Most read
Information
Privacy and
Security
Presented By: Anu Mary Sunny (6030063)
Information
Privacy
• Legal or moral right
• The ability to control information
about oneself
• Ability to express selectively
• Privacy in IT also known as Data
Privacy
Information Types
TELEVISION EDUCATIONAL FINANCIAL INTERNET LOCATIONAL
MEDICAL POLITICAL
Laws and Authorities
• Each country has its own
privacy protection policies
Example: Office of the Australian
Information Commissioner(OAIC)
Privacy
Protocols
and
Algorithms
Fair Information Practices: A standard for
collecting and using personal data
The Platform for Privacy Preferences: it is a
protocol for websites
Anti-Tracking Source Location Privacy Protection
Protocol: Protection of data in sensor networks
ID3 Decision Tree: Based on Interference which
adds ransom value to actual data
Privacy
Protocols,
Technologies
and
Algorithms
(Contd..)
Distributed Data Mining: An
algorithm based on secure
multi-party computation
Privacy Enhancing Technologies:
Methods of data protection in
accordance with law
Information
Security
Methods used for the
protection of data
Principles are:
Confidentiality, Integrity
and Availability
Threats on digital information
Viruses Worms Phishing attacks Trojan horses Theft of intellectual
property
Identity theft
Sabotage Ransomware
Security
Enforcement
Access Control:Identification, Authorization, Authentication
Application Security: Antivirus,Secure Coding,
Encryption
Firewall
Intrusion detection System
Run Time Application Self Protection
Mobile Secure Gateway
Relation Between Privacy and Security
PRIVACY IS ABOUT SAFEGUARDING THE USER
WHEREAS SECURITY IS ABOUT PROTECTION
OF DATA
PRIVACY CANNOT EXIST WITHOUT SECURITY
WHEREAS SECURITY CAN EXIST WITHOUT
PRIVACY.
Concerns
Health care: protection of patient
records
Sensor Networks: Protection of huge
amount of data generated by sensors
Online Business: Protection of
consumer records and bank details
Social Media: Protection of personal
details and chat history of users
Conclusion
• The term Information privacy and security are
closely related, where privacy cannot exist
without security whereas security can exist
without privacy.
• The threats of information can be from hackers,
vulnerabilities in software, lack of transparency
in privacy policies, collection of unnecessary
data, personal data sharing, data transfer over
insecure channels etc.
• https://www.youtube.com/watch?v=6vNxslcf9A
E
References
Anthony D, M, Ana Fernandez 2001, ‘Consumer Perceptions of Privacy and Security Risks
for Online Shopping’, vol. 35, no. 1, pp. 27-44.
Dimitrova, A & Brkan, M 2018, ‘Balancing National Security and Data Protection: The
Role of EU and US Policy-Makers and Courts before and after the NSA Affair’, JCMS:
Journal of Common Market Studies, vol. 56, no. 4, pp. 751-67.
France Belanger & crossler, RE 2011, ‘Privacy in the Digital Age: A Review of Information
Privacy Research in InformationSystems’, MIS Quarterly, vol. 35, no. 4, pp. 1017-41.
Kagal L, FT, Joshi A, Greenspan S. 2006, ‘Security and Privacy Challenges in Open and
Dynamic Environments’, Computer, vol. 39, no. 6, pp. 89-91.
Li, C & Liu, H-w 2015, ‘A Review of Privacy Protection in E-commerce’, Journal of
Advanced Management Science, pp. 50-3.
Marci Meingast, TRSS 2006, ‘Security and Privacy Issues with Health Care Information
Technology’, in International Conference of the IEEE Engineering in Medicine and Biology
Society, New York, NY, USA.
Meng, X 2008, ‘Analyze and Prevent the Security Risks of E-Commerce Privacy’, paper
presented to 2008 International Conference on Management of e-Commerce and e-
Government.
References
Santosh Krishna Putchala, KB, R Anitha 2013, ‘Information
security challenges in social media interactions: strategies
to normalize practices across physical and virtual worlds’,
paper presented to DSCI - Best Practices Meet, Chennai,
India, 12-12 July 2013.
Weber, RH 2010, ‘Internet of Things – New security and
privacy challenges’, Computer Law & Security Review, vol.
26, no. 1, pp. 23-30.
Xin He, WPT 2017, ‘Multilayer Sensor Network for
Information Privacy’, in IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), New
Orleans, LA, USA.

More Related Content

PPT
“Privacy Today” Slide Presentation
PPTX
Security Awareness Training.pptx
PPT
Phishing
PDF
Privacy and Data Security
PDF
Data Protection and Privacy
PDF
Data Privacy & Security
PPTX
Data Security - English
PPTX
Information Privacy
“Privacy Today” Slide Presentation
Security Awareness Training.pptx
Phishing
Privacy and Data Security
Data Protection and Privacy
Data Privacy & Security
Data Security - English
Information Privacy

What's hot (20)

PPTX
Data protection ppt
PDF
Cyber security training
PPTX
Encryption.ppt
PPTX
Privacy issues and internet privacy
PPTX
Hyphenet Security Awareness Training
PDF
Cyber Security Awareness
PPTX
Presentation on Information Privacy
PPT
Data Protection Presentation
PPTX
Email security
PDF
6 Security Tips for Using Public WiFi
PPTX
Identity theft ppt
PPTX
INFORMATION SECURITY
PPTX
Social engineering
PDF
Overview on data privacy
PPTX
Social Engineering new.pptx
PPT
Email Security and Awareness
PPTX
Cyber Security Awareness
PPTX
Mobile security
PPTX
Different types of attacks in internet
PPTX
Cybersecurity Awareness Training
Data protection ppt
Cyber security training
Encryption.ppt
Privacy issues and internet privacy
Hyphenet Security Awareness Training
Cyber Security Awareness
Presentation on Information Privacy
Data Protection Presentation
Email security
6 Security Tips for Using Public WiFi
Identity theft ppt
INFORMATION SECURITY
Social engineering
Overview on data privacy
Social Engineering new.pptx
Email Security and Awareness
Cyber Security Awareness
Mobile security
Different types of attacks in internet
Cybersecurity Awareness Training
Ad

Similar to Information privacy and Security (20)

PPT
An Introduction to Privacy Policy Lecture Note One.ppt
PPTX
Constitution IP[1].pptx - AutoRecovered.pptx
PPTX
Information Security Awareness Training by Jeremiah
PPTX
Understanding and Mitigating Cybersecurity Threats in Health Sector.pptx
PDF
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
PDF
Lecture 1-2.pdf
PPT
hel29999999999999999999999999999999999999999999.ppt
PPTX
The Ethics of Digital Health
PDF
Examining the Effect of Individual Differences and Concerns Related to
PPTX
Privacy and data protection primer - City of Portland
PPTX
Information policy ppt
PDF
DATA & PRIVACY PROTECTION Anna Monreale Università di Pisa
PDF
Data Protection
 in the Age of Big Data
PDF
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
PDF
Ethical Challenges in Technology_ Balancing Privacy and Surveillance by Jorda...
PPTX
Ethical_and_Social_Issues_in_Information_Systems.pptx
PDF
Submit Your Research Papers - International Journal of Information Sciences a...
PDF
Privacy and Surveillance
PDF
Submit Your Research Papers - International Journal of Information Sciences a...
PDF
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
An Introduction to Privacy Policy Lecture Note One.ppt
Constitution IP[1].pptx - AutoRecovered.pptx
Information Security Awareness Training by Jeremiah
Understanding and Mitigating Cybersecurity Threats in Health Sector.pptx
Christopher Millard Legally Compliant Use Of Personal Data In E Social Science
Lecture 1-2.pdf
hel29999999999999999999999999999999999999999999.ppt
The Ethics of Digital Health
Examining the Effect of Individual Differences and Concerns Related to
Privacy and data protection primer - City of Portland
Information policy ppt
DATA & PRIVACY PROTECTION Anna Monreale Università di Pisa
Data Protection
 in the Age of Big Data
Data Con LA 2019 - Applied Privacy Engineering Study on SEER database by Ken ...
Ethical Challenges in Technology_ Balancing Privacy and Surveillance by Jorda...
Ethical_and_Social_Issues_in_Information_Systems.pptx
Submit Your Research Papers - International Journal of Information Sciences a...
Privacy and Surveillance
Submit Your Research Papers - International Journal of Information Sciences a...
1-78-blockchainandhealthitalgorithmsprivacydata_whitepaper
Ad

Recently uploaded (20)

PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Sustainable Sites - Green Building Construction
DOCX
573137875-Attendance-Management-System-original
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Construction Project Organization Group 2.pptx
PPT
Mechanical Engineering MATERIALS Selection
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Geodesy 1.pptx...............................................
PPT
Project quality management in manufacturing
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
web development for engineering and engineering
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
PPT on Performance Review to get promotions
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
bas. eng. economics group 4 presentation 1.pptx
Sustainable Sites - Green Building Construction
573137875-Attendance-Management-System-original
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Construction Project Organization Group 2.pptx
Mechanical Engineering MATERIALS Selection
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Strings in CPP - Strings in C++ are sequences of characters used to store and...
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Geodesy 1.pptx...............................................
Project quality management in manufacturing
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
web development for engineering and engineering
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT on Performance Review to get promotions
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
OOP with Java - Java Introduction (Basics)
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Operating System & Kernel Study Guide-1 - converted.pdf

Information privacy and Security

  • 2. Information Privacy • Legal or moral right • The ability to control information about oneself • Ability to express selectively • Privacy in IT also known as Data Privacy
  • 3. Information Types TELEVISION EDUCATIONAL FINANCIAL INTERNET LOCATIONAL MEDICAL POLITICAL
  • 4. Laws and Authorities • Each country has its own privacy protection policies Example: Office of the Australian Information Commissioner(OAIC)
  • 5. Privacy Protocols and Algorithms Fair Information Practices: A standard for collecting and using personal data The Platform for Privacy Preferences: it is a protocol for websites Anti-Tracking Source Location Privacy Protection Protocol: Protection of data in sensor networks ID3 Decision Tree: Based on Interference which adds ransom value to actual data
  • 6. Privacy Protocols, Technologies and Algorithms (Contd..) Distributed Data Mining: An algorithm based on secure multi-party computation Privacy Enhancing Technologies: Methods of data protection in accordance with law
  • 7. Information Security Methods used for the protection of data Principles are: Confidentiality, Integrity and Availability
  • 8. Threats on digital information Viruses Worms Phishing attacks Trojan horses Theft of intellectual property Identity theft Sabotage Ransomware
  • 9. Security Enforcement Access Control:Identification, Authorization, Authentication Application Security: Antivirus,Secure Coding, Encryption Firewall Intrusion detection System Run Time Application Self Protection Mobile Secure Gateway
  • 10. Relation Between Privacy and Security PRIVACY IS ABOUT SAFEGUARDING THE USER WHEREAS SECURITY IS ABOUT PROTECTION OF DATA PRIVACY CANNOT EXIST WITHOUT SECURITY WHEREAS SECURITY CAN EXIST WITHOUT PRIVACY.
  • 11. Concerns Health care: protection of patient records Sensor Networks: Protection of huge amount of data generated by sensors Online Business: Protection of consumer records and bank details Social Media: Protection of personal details and chat history of users
  • 12. Conclusion • The term Information privacy and security are closely related, where privacy cannot exist without security whereas security can exist without privacy. • The threats of information can be from hackers, vulnerabilities in software, lack of transparency in privacy policies, collection of unnecessary data, personal data sharing, data transfer over insecure channels etc. • https://www.youtube.com/watch?v=6vNxslcf9A E
  • 13. References Anthony D, M, Ana Fernandez 2001, ‘Consumer Perceptions of Privacy and Security Risks for Online Shopping’, vol. 35, no. 1, pp. 27-44. Dimitrova, A & Brkan, M 2018, ‘Balancing National Security and Data Protection: The Role of EU and US Policy-Makers and Courts before and after the NSA Affair’, JCMS: Journal of Common Market Studies, vol. 56, no. 4, pp. 751-67. France Belanger & crossler, RE 2011, ‘Privacy in the Digital Age: A Review of Information Privacy Research in InformationSystems’, MIS Quarterly, vol. 35, no. 4, pp. 1017-41. Kagal L, FT, Joshi A, Greenspan S. 2006, ‘Security and Privacy Challenges in Open and Dynamic Environments’, Computer, vol. 39, no. 6, pp. 89-91. Li, C & Liu, H-w 2015, ‘A Review of Privacy Protection in E-commerce’, Journal of Advanced Management Science, pp. 50-3. Marci Meingast, TRSS 2006, ‘Security and Privacy Issues with Health Care Information Technology’, in International Conference of the IEEE Engineering in Medicine and Biology Society, New York, NY, USA. Meng, X 2008, ‘Analyze and Prevent the Security Risks of E-Commerce Privacy’, paper presented to 2008 International Conference on Management of e-Commerce and e- Government.
  • 14. References Santosh Krishna Putchala, KB, R Anitha 2013, ‘Information security challenges in social media interactions: strategies to normalize practices across physical and virtual worlds’, paper presented to DSCI - Best Practices Meet, Chennai, India, 12-12 July 2013. Weber, RH 2010, ‘Internet of Things – New security and privacy challenges’, Computer Law & Security Review, vol. 26, no. 1, pp. 23-30. Xin He, WPT 2017, ‘Multilayer Sensor Network for Information Privacy’, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, USA.