SlideShare a Scribd company logo
2
Most read
3
Most read
4
Most read
Privacy and Security Information
By: Adeel Rasheed
 https://chauhantricks.blogspot.com/
 https://www.slideshare.net/adeel02
Computer Privacy
 Everyone takes privacy in normal life for granted,
computer also have privacy.
 When dealing with computers, security and privacy
are almost synonyms.
Ways of computer privacy
 Password
 Encryption
 Email Privacy
Password
 Not just to protect the computer but to make sure that
the computer issues by authorized worker or user only.
 Password is private combination of characters
associated with the user name that allows access to
computer resources
Encryption
 With public key encryption there are two keys, one
public and the other private.
 The public key needs to be known.
 To send a message to a friend, you uses his public key
to encrypt the message.
 Your friend then uses his private key to decode the
message after receiving it.
Email Privacy
 When u send a message by email, the message is
broken into packets and the packets are sent out over
the Internet.
 The number of packets depends on the size of
message.
 Each message has the internet address of the recipient.
 This means there may be some places between the
packets could be intercepted and examined
Information Security
 The quality or state of being secure to be free from
danger
 Security is achieved using several strategies
 Security is achieved using several strategies
simultaneously or used in combination with one
another
 Security is recognized as essential to protect vital
processes and the systems that provide those processes
 Security is not something you buy, it is something you
do
Information can be
 Created
 Stored
 Destroyed
 Processed
 Transmitted
 Used – (For proper & improper purposes)
 Corrupted
 Lost
 Stolen
 HACKER: Create or improve programs and shared
those program with fellow hackers . Typically are not
criminal.
 CRACKERS: Share programs designed to gain
unauthorized access computer systems or disrupt
networks. Typically are criminals.
 CARDERS: Specialize in stealing, trading and using
stolen credit cards over the internet.
MALICIOUS PROGRAMS (MALWARE)
Design to damage or disrupt computer system. Most
common types of malware
 viruses
 worms
 Trojan horses.
Measure to Protect Computer
Security
RESTRICTING ACCESS:
 Sometimes security matter of putting guards on
company computer rooms and checking the
identification of everyone admitted. Other times it use
 Biometric scanning such as fingerprint and iris.
 Password are secret words or phrases that must be
keyed into a computer system to gain access.
Ethics
 Standards of moral products.
 The right to keep personal information, such as credit
ratings and medical histories, from getting into
unauthorized hands.
Two important issues in computer
ethics
 Copyright and Digital Right Management
 Plagiarism
Copyright
 Gives content creators the right to control the use and
distribution of their work.
Example of materials :
Paintings , books , music, films , video games.
 Others : make unauthorized copies
 Digital media. (violates copyright)
Software Piracy
 Digital Millennium Copyright Act
established the right of the program owner to make a backup
copy and disallow the creation of copies.
illegal to download copyright-protected music and videos
from Internet.
 Digital rights management (DRM)
collection of technologies designed to prevent copyright
violations.
control the number of devices that can access given file.
limits the kinds of devices that can access a file.
Plagiarism
 The illegal and unethical representation of some other
person’s work and ideas as your own without giving
credit to the original Source.
 Example : cutting & pasting Web content into a report
or paper.
Thanks You

More Related Content

PPTX
Antivirus And Malware Protection
PPTX
File organization
PPTX
DMBS Indexes.pptx
PPTX
UNIT - 5: Data Warehousing and Data Mining
PPTX
Database security
PPT
Transmission Modes in Computer Networks
PPT
Guided Transmission Media
PPTX
Computer Security risks Shelly
Antivirus And Malware Protection
File organization
DMBS Indexes.pptx
UNIT - 5: Data Warehousing and Data Mining
Database security
Transmission Modes in Computer Networks
Guided Transmission Media
Computer Security risks Shelly

What's hot (20)

PPTX
Concurrency Control in Database Management System
PPTX
basic structure of SQL FINAL.pptx
PPTX
Connection Establishment & Flow and Congestion Control
PPTX
Peer to-peer network
PPTX
Uniform Resource Locator (URL)
PPT
File system
PDF
Computer Network Interview Questions
PPTX
Distribution transparency and Distributed transaction
PPTX
Data leakage detection
PPTX
Distributed Database Management System
PPTX
Advantages of DBMS
PPTX
OSI Model
PPT
Introduction to switching & circuit switching
PPTX
Internet ethics
PPTX
Components and Advantages of DBMS
PPTX
Centralised and distributed database
PPTX
Internet Security
PPTX
data abstraction in DBMS
PPTX
difference between hub, bridge, switch and router
PPTX
Distributed database
Concurrency Control in Database Management System
basic structure of SQL FINAL.pptx
Connection Establishment & Flow and Congestion Control
Peer to-peer network
Uniform Resource Locator (URL)
File system
Computer Network Interview Questions
Distribution transparency and Distributed transaction
Data leakage detection
Distributed Database Management System
Advantages of DBMS
OSI Model
Introduction to switching & circuit switching
Internet ethics
Components and Advantages of DBMS
Centralised and distributed database
Internet Security
data abstraction in DBMS
difference between hub, bridge, switch and router
Distributed database
Ad

Similar to Privacy and Security Information (20)

PPT
Tutorial 09 - Security on the Internet and the Web
 
PPT
Ch # 10 computer security risks and safe guards
DOCX
Computer virus
PDF
E4IT_08_TiengAnhChuyenNganhCongNgheThongTinTLU
PPTX
Computer security and privacy
PPTX
Internet security
PPT
Armand Hacking
PPTX
Ethics and privacy ppt 3rd period
PPTX
cyber_security
PPTX
Β. Hucking
PPTX
Computer security and
PPTX
Online safety and security
PPTX
Communication security
PDF
7 Types of Cyber Security Threats | The Lifesciences Magazine
DOC
Computer Secutity.
PPTX
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
PPT
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
PDF
Cyber Privacy & Password Protection
PPTX
Computer security ethics_and_privacy
Tutorial 09 - Security on the Internet and the Web
 
Ch # 10 computer security risks and safe guards
Computer virus
E4IT_08_TiengAnhChuyenNganhCongNgheThongTinTLU
Computer security and privacy
Internet security
Armand Hacking
Ethics and privacy ppt 3rd period
cyber_security
Β. Hucking
Computer security and
Online safety and security
Communication security
7 Types of Cyber Security Threats | The Lifesciences Magazine
Computer Secutity.
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
Cyber-Securityyyyyyyyyyyyyyyyyyyyyyyy.ppt
Cyber Privacy & Password Protection
Computer security ethics_and_privacy
Ad

More from Adeel Rasheed (20)

PPTX
Multan to Sukkur Motorway (M5)
PPTX
Religious Conflict
DOCX
R Studio (Report)
DOCX
History of computer (1st to 5th Generations)
PPTX
CSS Cascade Style Sheet
PPTX
Zooming and Its Types
PPTX
User Interface & Its Types
DOCX
Questions About Android Application Development
PPTX
Human and Machine Learning
PPTX
IP Address - IPv4 & IPv6
PPTX
Computer Crime
PPTX
Code of Conduct - Code of Practice & Standards
PPTX
Self Adaptive Systems
PPTX
Ethernet - LAN
PPTX
Synchronous and Asynchronous Transmission
PPTX
Classes and Objects in C#
DOCX
Intel Microprocessors 8086 Documentation
DOCX
Applications of Computer
DOCX
Hysteresis Loop
DOCX
Notes of Important Programming Fundamental Questions
Multan to Sukkur Motorway (M5)
Religious Conflict
R Studio (Report)
History of computer (1st to 5th Generations)
CSS Cascade Style Sheet
Zooming and Its Types
User Interface & Its Types
Questions About Android Application Development
Human and Machine Learning
IP Address - IPv4 & IPv6
Computer Crime
Code of Conduct - Code of Practice & Standards
Self Adaptive Systems
Ethernet - LAN
Synchronous and Asynchronous Transmission
Classes and Objects in C#
Intel Microprocessors 8086 Documentation
Applications of Computer
Hysteresis Loop
Notes of Important Programming Fundamental Questions

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Chapter 3 Spatial Domain Image Processing.pdf
Encapsulation theory and applications.pdf
Big Data Technologies - Introduction.pptx
cuic standard and advanced reporting.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
Digital-Transformation-Roadmap-for-Companies.pptx
Modernizing your data center with Dell and AMD
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Privacy and Security Information

  • 2. By: Adeel Rasheed  https://chauhantricks.blogspot.com/  https://www.slideshare.net/adeel02
  • 3. Computer Privacy  Everyone takes privacy in normal life for granted, computer also have privacy.  When dealing with computers, security and privacy are almost synonyms.
  • 4. Ways of computer privacy  Password  Encryption  Email Privacy
  • 5. Password  Not just to protect the computer but to make sure that the computer issues by authorized worker or user only.  Password is private combination of characters associated with the user name that allows access to computer resources
  • 6. Encryption  With public key encryption there are two keys, one public and the other private.  The public key needs to be known.  To send a message to a friend, you uses his public key to encrypt the message.  Your friend then uses his private key to decode the message after receiving it.
  • 7. Email Privacy  When u send a message by email, the message is broken into packets and the packets are sent out over the Internet.  The number of packets depends on the size of message.  Each message has the internet address of the recipient.  This means there may be some places between the packets could be intercepted and examined
  • 8. Information Security  The quality or state of being secure to be free from danger  Security is achieved using several strategies  Security is achieved using several strategies simultaneously or used in combination with one another  Security is recognized as essential to protect vital processes and the systems that provide those processes  Security is not something you buy, it is something you do
  • 9. Information can be  Created  Stored  Destroyed  Processed  Transmitted  Used – (For proper & improper purposes)  Corrupted  Lost  Stolen
  • 10.  HACKER: Create or improve programs and shared those program with fellow hackers . Typically are not criminal.  CRACKERS: Share programs designed to gain unauthorized access computer systems or disrupt networks. Typically are criminals.  CARDERS: Specialize in stealing, trading and using stolen credit cards over the internet.
  • 11. MALICIOUS PROGRAMS (MALWARE) Design to damage or disrupt computer system. Most common types of malware  viruses  worms  Trojan horses.
  • 12. Measure to Protect Computer Security RESTRICTING ACCESS:  Sometimes security matter of putting guards on company computer rooms and checking the identification of everyone admitted. Other times it use  Biometric scanning such as fingerprint and iris.  Password are secret words or phrases that must be keyed into a computer system to gain access.
  • 13. Ethics  Standards of moral products.  The right to keep personal information, such as credit ratings and medical histories, from getting into unauthorized hands.
  • 14. Two important issues in computer ethics  Copyright and Digital Right Management  Plagiarism
  • 15. Copyright  Gives content creators the right to control the use and distribution of their work. Example of materials : Paintings , books , music, films , video games.  Others : make unauthorized copies  Digital media. (violates copyright)
  • 16. Software Piracy  Digital Millennium Copyright Act established the right of the program owner to make a backup copy and disallow the creation of copies. illegal to download copyright-protected music and videos from Internet.  Digital rights management (DRM) collection of technologies designed to prevent copyright violations. control the number of devices that can access given file. limits the kinds of devices that can access a file.
  • 17. Plagiarism  The illegal and unethical representation of some other person’s work and ideas as your own without giving credit to the original Source.  Example : cutting & pasting Web content into a report or paper.