SlideShare a Scribd company logo
2
Most read
3
Most read
12
Most read
GNED 190
INTERNET PRIVACY:
IS INTERNET PRIVACY DEAD, OR IS
IT STILL POSSIBLE TO PROTECT
YOURSELF?
By: Matthew Momney
ADVANCING TECHNOLOGY
With internet advancing as fast as it is, and the complexity of the
tools to use it ever-growing, it is possible for the everyday user to
maintain their own security on the web? How far does one have to
delve into the underbelly of the world wide web to obtain the privacy
they both want and deserve? The abusive capabilities that today’s
browsers have and the speed at which they can be used is astounding.
THE POTENTIAL RISKS
The main issue with maintaining privacy on the internet is the
fact that there are a number of different ways to access the information
necessary to abuse or cause harm to an internet user.
Whether it’s obtaining statistics and browsing information, or
spreading spyware and viruses, the techniques available are almost
effortless and do not take much experience to use.
SOCIAL MEDIA
One of the most common outlets for information about a user is
using social media. These websites provide valuable information at the
user’s own expense without necessarily meaning to.
Privacy settings are often secondary and take some navigating
to locate. Sites like Facebook.com for example have your privacy set to
open as a default for new users. They do prompt you to set privacy
settings, but operate them separately for each piece of content. You
may have your main profile page set to be viewed by only people you
have accepted as friends, however your profile pictures could be
viewable.
FACE RECOGNIZERS
The frightening thing about social media sites being open about
sharing information is the ability to use face recognizers to match your
face with that of the pictures on your profiles.
Experts were able to prove they could come up with social
insurance numbers with just a web cam, a face recognizer, and an
internet connection. Simple tasks that anyone with the tools can
accomplish.
FACE RECOGNIZERS CONT’D
With this same technology identity thieves are using, legitimately
run companies are gathering statistical information about their
customers.
By using the faces captured on their surveillance cameras and
matching them to social media profiles, their personal information can
be gathered and analyzed to better grasp their target audience.
PUBLIC PHOTOGRAPHS
Always an eerie thought is someone taking your photograph without
you knowing. Even more creepy is the fact that it’s not against the law in any
way if you’re in a public place.
Anyone has the freedom to capture your face in anyway and alter the
photo however they deem fit to post on the internet, and are only forced to
remove the image from where they posted it if compliance is not received from
the person in the photograph.
Even after the photograph is removed, it can be a lengthy process with
legal action to force the abuser to stop or international laws depending on
where they are located. By that time the damage that the photograph can
cause has already been done, and there’s no way to change the results.
HTTP COOKIES
The average user may know the browsers store them on their
computer, but most do not know how HTTP cookies work. An HTTP
cookie is a small piece of data sent from a website and stored on a
user’s computer when they access said website.
Unknowingly to the average internet user, cookies are very
useful in tracking the user’s movements on the website, how frequently
they view the pages, which pages they view the most, etc.
HTTP COOKIES CONT’D
The cookies are established to make internet browsing fast and
enjoyable, by decreasing the time it would take to load a page you’ve
previously been on, but there are malicious ways to abuse them.
Tracking cookies allow web profiling, where the user’s browser
history is obtained allowing them to get more personal information on
the user who visited the websites.
GOVERNMENT CONTROL
When referring to government control, an overall access and
censorship of the internet by the government to standards they deem fit.
This method of censorship is used by the Chinese Government
to restrict the internet users of their country from uploading any content
they see as negative towards their country.
The same type of idea was almost implemented in the United
States with the Stop Online Piracy Act (SOPA) and the Protect IP Act
(PIPA) which was introduced to stop copyright infringement, but in the
end would eliminate all of the user uploaded content and freedom the
internet has to offer.
STEPS TO SECURE YOURSELF:
Passwords
Securing your website accounts with strong passwords that
would be difficult to guess or decode. Include capital and small
caps, numbers, and even characters when available.
Choose different passwords for each account so the security
of each is just as tight. If one password is figured out, you would
not want them to then be able to access all of your accounts.
STEPS TO SECURE YOURSELF:
Virus Protection
It is paramount that you run a virus protection service on your
computer. There are so many doorways viruses can come
though, and it is not worth the risk not to be safe while connected
to the internet.
Many users have virus protection either preinstalled on the
machine or purchased, but don’t run the automatic updates.
Viruses are developed and updated just as fast as the virus
protection software, so it is vital to maintain up-to-date protection
software.
STEPS TO SECURE YOURSELF:
Google Yourself
It sounds strange, but a simple google search of yourself to
see what results come up is a good way to monitor your own
privacy.
There are ways to go about asking google to remove content
from their search engine if you find it inappropriate or slanderous
such as emails or forms in their privacy section of their site.
STEPS TO SECURE YOURSELF:
Limit the Content You Share
It might seem redundant to say, but be careful what content
you share on the internet. Information is the key to everything
online, and one piece can lead to a treasure trove of your own
personal identity.
Keep your social media profiles tidy. Sweep the bad stuff
under the rug so to speak and push the content out of sight with
a flood of posts if they’re not possible to remove.
ONLINE PROTECTION VIDEO
https://www.youtube.com/watch?v=daF-_Q9lfg0
The video plays in slideshow mode
OVERALL
It is not impossible to protect yourself from the malicious content
on the internet, but it does take some time and effort. Reading privacy
policies, checking privacy settings, and keeping an eye on what content
comes up in search engines about you.
The best protection is not allowing anything at all, but limiting the
amount of information you share, or using only one credit card for
example will provide better control if anything does go wrong.
Privacy is not dead, but you do have to bury your head in the ground to
stay safe.
DISCUSSION QUESTION
What do you think? Is internet privacy dead or is it still possible to
protect yourself?
THANK YOU!
Sources:
• Steve Rambam, Privacy is Dead, Get Over It,
https://www.youtube.com/watch?v=DaYn_PkrfvQ
• Privacy issues of Social networking sites –
http://www.isaca.org/Groups/Professional-English/security-
trend/GroupDocuments/Social-Media-Wh-Paper-26-May10-Research.pdf
• Discovered the article:
Online photos can reveal our private data say experts - BBC NEWS -
http://www.bbc.co.uk/news/technology-14386514
• Linked to from BBC NEWS:
More Than Facial Recognition - Carnegie Mellon University -
http://www.cmu.edu/homepage/society/2011/summer/facial-recognition.shtml

More Related Content

PPTX
Scanning Electron Microscope (SEM)
PPTX
Data Privacy and Protection Presentation
PPTX
Internet Privacy
TXT
8500+ ALAMAT EMAIL:::: Daftar Alamat Surat Elektronik Gmail, YAHOOMAIL,HOTMAI...
PPT
Le Management de crise
PPTX
Privacy issues and internet privacy
DOCX
Satellite antennas
PDF
Everything You Need To Know About ChatGPT
Scanning Electron Microscope (SEM)
Data Privacy and Protection Presentation
Internet Privacy
8500+ ALAMAT EMAIL:::: Daftar Alamat Surat Elektronik Gmail, YAHOOMAIL,HOTMAI...
Le Management de crise
Privacy issues and internet privacy
Satellite antennas
Everything You Need To Know About ChatGPT

What's hot (20)

PPTX
Social Media Cyber Security Awareness Briefing
PPTX
Internet Privacy
PPTX
Cyber crime and security
PPTX
Cyber Crime And Security
PPTX
Stop Cyberbullying
PPSX
Cyber crime and cyber security
PPTX
Mobile security
PPT
Phishing attacks ppt
PPTX
Cyber Security Presentation "It Will Never Happen To Me"
PPTX
Cyber Crime
PPTX
Cyber Crime and Security
PPTX
Cyber security presentation
PPTX
Cyber Crime and Cyber Security
PPTX
Social engineering
PPTX
The Dark Web
PPTX
Cyber bullying Presentation
PPTX
Cyber crime & security
PPT
Cyber Crime and Security
PPTX
Cyber security for children
PPTX
Social Media Privacy
Social Media Cyber Security Awareness Briefing
Internet Privacy
Cyber crime and security
Cyber Crime And Security
Stop Cyberbullying
Cyber crime and cyber security
Mobile security
Phishing attacks ppt
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Crime
Cyber Crime and Security
Cyber security presentation
Cyber Crime and Cyber Security
Social engineering
The Dark Web
Cyber bullying Presentation
Cyber crime & security
Cyber Crime and Security
Cyber security for children
Social Media Privacy
Ad

Viewers also liked (20)

PDF
Online Privacy
PPTX
Privacy , Security and Ethics Presentation
PPT
“Privacy Today” Slide Presentation
PPT
Privacy on the Internet
PPTX
Presentation on Information Privacy
PDF
Internet privacy
PDF
Internet privacy ethics and online security
PPTX
Audio&Video
PPT
Ethics online
PPTX
Ethics and privacy ppt 3rd period
PPT
Illegal downloading
PPTX
Online Privacy and Security
PPTX
Chapter 11 computer security and safety, ethics, and privacy
PDF
Computer Security and Safety, Ethics & Privacy
PPTX
Bootstrap ppt
PPTX
How TOR works?
PPTX
Responsive web-design through bootstrap
PPT
Tor Presentation
PPTX
jQuery PPT
Online Privacy
Privacy , Security and Ethics Presentation
“Privacy Today” Slide Presentation
Privacy on the Internet
Presentation on Information Privacy
Internet privacy
Internet privacy ethics and online security
Audio&Video
Ethics online
Ethics and privacy ppt 3rd period
Illegal downloading
Online Privacy and Security
Chapter 11 computer security and safety, ethics, and privacy
Computer Security and Safety, Ethics & Privacy
Bootstrap ppt
How TOR works?
Responsive web-design through bootstrap
Tor Presentation
jQuery PPT
Ad

Similar to Internet privacy presentation (20)

PPTX
Cyber ethics cbse class xi
PDF
How to Protect Your Privacy Online_ A Step-by-Step Guide for 2024.pdf
PDF
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
PDF
Cybersecurity Awareness Infographics
PPT
Computer And Internet Security
PPT
Computer And Internet Security
PPTX
Online-Safety-Security-and-etiquette.pptx
PPTX
1.2 Best Practices of Cyber Security sbk.pptx
PPTX
Empowerment TECHONOLOGY 12- FIRST SEMESTER
PDF
Five habits that might be a cyber security risk
PPTX
The use of internet web 120
PPT
Password Management
PDF
Empowerment Technologies - Module 2
PPTX
Social network and digital security
PDF
Center for Identity Webcast: The Internet of Things
PPTX
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
PPTX
Info Session on Cybersecurity & Cybersecurity Study Jams
PPTX
Do not track me
PPTX
about cyber bullying -Presentation1.pptx
PPTX
Information security awareness - 101
Cyber ethics cbse class xi
How to Protect Your Privacy Online_ A Step-by-Step Guide for 2024.pdf
Grade 12 Empowerment Technologies Quarter 1 module 2 Lesson 2
Cybersecurity Awareness Infographics
Computer And Internet Security
Computer And Internet Security
Online-Safety-Security-and-etiquette.pptx
1.2 Best Practices of Cyber Security sbk.pptx
Empowerment TECHONOLOGY 12- FIRST SEMESTER
Five habits that might be a cyber security risk
The use of internet web 120
Password Management
Empowerment Technologies - Module 2
Social network and digital security
Center for Identity Webcast: The Internet of Things
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
Info Session on Cybersecurity & Cybersecurity Study Jams
Do not track me
about cyber bullying -Presentation1.pptx
Information security awareness - 101

Recently uploaded (20)

PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Insiders guide to clinical Medicine.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Classroom Observation Tools for Teachers
PDF
Pre independence Education in Inndia.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
GDM (1) (1).pptx small presentation for students
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Supply Chain Operations Speaking Notes -ICLT Program
Insiders guide to clinical Medicine.pdf
Basic Mud Logging Guide for educational purpose
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Microbial disease of the cardiovascular and lymphatic systems
Classroom Observation Tools for Teachers
Pre independence Education in Inndia.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Sports Quiz easy sports quiz sports quiz
Final Presentation General Medicine 03-08-2024.pptx
TR - Agricultural Crops Production NC III.pdf
Complications of Minimal Access Surgery at WLH
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
human mycosis Human fungal infections are called human mycosis..pptx

Internet privacy presentation

  • 1. GNED 190 INTERNET PRIVACY: IS INTERNET PRIVACY DEAD, OR IS IT STILL POSSIBLE TO PROTECT YOURSELF? By: Matthew Momney
  • 2. ADVANCING TECHNOLOGY With internet advancing as fast as it is, and the complexity of the tools to use it ever-growing, it is possible for the everyday user to maintain their own security on the web? How far does one have to delve into the underbelly of the world wide web to obtain the privacy they both want and deserve? The abusive capabilities that today’s browsers have and the speed at which they can be used is astounding.
  • 3. THE POTENTIAL RISKS The main issue with maintaining privacy on the internet is the fact that there are a number of different ways to access the information necessary to abuse or cause harm to an internet user. Whether it’s obtaining statistics and browsing information, or spreading spyware and viruses, the techniques available are almost effortless and do not take much experience to use.
  • 4. SOCIAL MEDIA One of the most common outlets for information about a user is using social media. These websites provide valuable information at the user’s own expense without necessarily meaning to. Privacy settings are often secondary and take some navigating to locate. Sites like Facebook.com for example have your privacy set to open as a default for new users. They do prompt you to set privacy settings, but operate them separately for each piece of content. You may have your main profile page set to be viewed by only people you have accepted as friends, however your profile pictures could be viewable.
  • 5. FACE RECOGNIZERS The frightening thing about social media sites being open about sharing information is the ability to use face recognizers to match your face with that of the pictures on your profiles. Experts were able to prove they could come up with social insurance numbers with just a web cam, a face recognizer, and an internet connection. Simple tasks that anyone with the tools can accomplish.
  • 6. FACE RECOGNIZERS CONT’D With this same technology identity thieves are using, legitimately run companies are gathering statistical information about their customers. By using the faces captured on their surveillance cameras and matching them to social media profiles, their personal information can be gathered and analyzed to better grasp their target audience.
  • 7. PUBLIC PHOTOGRAPHS Always an eerie thought is someone taking your photograph without you knowing. Even more creepy is the fact that it’s not against the law in any way if you’re in a public place. Anyone has the freedom to capture your face in anyway and alter the photo however they deem fit to post on the internet, and are only forced to remove the image from where they posted it if compliance is not received from the person in the photograph. Even after the photograph is removed, it can be a lengthy process with legal action to force the abuser to stop or international laws depending on where they are located. By that time the damage that the photograph can cause has already been done, and there’s no way to change the results.
  • 8. HTTP COOKIES The average user may know the browsers store them on their computer, but most do not know how HTTP cookies work. An HTTP cookie is a small piece of data sent from a website and stored on a user’s computer when they access said website. Unknowingly to the average internet user, cookies are very useful in tracking the user’s movements on the website, how frequently they view the pages, which pages they view the most, etc.
  • 9. HTTP COOKIES CONT’D The cookies are established to make internet browsing fast and enjoyable, by decreasing the time it would take to load a page you’ve previously been on, but there are malicious ways to abuse them. Tracking cookies allow web profiling, where the user’s browser history is obtained allowing them to get more personal information on the user who visited the websites.
  • 10. GOVERNMENT CONTROL When referring to government control, an overall access and censorship of the internet by the government to standards they deem fit. This method of censorship is used by the Chinese Government to restrict the internet users of their country from uploading any content they see as negative towards their country. The same type of idea was almost implemented in the United States with the Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA) which was introduced to stop copyright infringement, but in the end would eliminate all of the user uploaded content and freedom the internet has to offer.
  • 11. STEPS TO SECURE YOURSELF: Passwords Securing your website accounts with strong passwords that would be difficult to guess or decode. Include capital and small caps, numbers, and even characters when available. Choose different passwords for each account so the security of each is just as tight. If one password is figured out, you would not want them to then be able to access all of your accounts.
  • 12. STEPS TO SECURE YOURSELF: Virus Protection It is paramount that you run a virus protection service on your computer. There are so many doorways viruses can come though, and it is not worth the risk not to be safe while connected to the internet. Many users have virus protection either preinstalled on the machine or purchased, but don’t run the automatic updates. Viruses are developed and updated just as fast as the virus protection software, so it is vital to maintain up-to-date protection software.
  • 13. STEPS TO SECURE YOURSELF: Google Yourself It sounds strange, but a simple google search of yourself to see what results come up is a good way to monitor your own privacy. There are ways to go about asking google to remove content from their search engine if you find it inappropriate or slanderous such as emails or forms in their privacy section of their site.
  • 14. STEPS TO SECURE YOURSELF: Limit the Content You Share It might seem redundant to say, but be careful what content you share on the internet. Information is the key to everything online, and one piece can lead to a treasure trove of your own personal identity. Keep your social media profiles tidy. Sweep the bad stuff under the rug so to speak and push the content out of sight with a flood of posts if they’re not possible to remove.
  • 16. OVERALL It is not impossible to protect yourself from the malicious content on the internet, but it does take some time and effort. Reading privacy policies, checking privacy settings, and keeping an eye on what content comes up in search engines about you. The best protection is not allowing anything at all, but limiting the amount of information you share, or using only one credit card for example will provide better control if anything does go wrong. Privacy is not dead, but you do have to bury your head in the ground to stay safe.
  • 17. DISCUSSION QUESTION What do you think? Is internet privacy dead or is it still possible to protect yourself?
  • 18. THANK YOU! Sources: • Steve Rambam, Privacy is Dead, Get Over It, https://www.youtube.com/watch?v=DaYn_PkrfvQ • Privacy issues of Social networking sites – http://www.isaca.org/Groups/Professional-English/security- trend/GroupDocuments/Social-Media-Wh-Paper-26-May10-Research.pdf • Discovered the article: Online photos can reveal our private data say experts - BBC NEWS - http://www.bbc.co.uk/news/technology-14386514 • Linked to from BBC NEWS: More Than Facial Recognition - Carnegie Mellon University - http://www.cmu.edu/homepage/society/2011/summer/facial-recognition.shtml