河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第09章 隐私 Privacy

SECURITY N COMPUTING FIETH EDITION Chapter 9: Privacy 授课教师:高海波 可南中医药大学 信息管理与信息系统教研室 rom Security in Computing, Fifth Edition, by Charles P. Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
SECURITY IN COMPUTING, FIFTH EDITION Chapter 9: Privacy From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. 1 授课教师:高海波 河南中医药大学 信息管理与信息系统教研室

2 Chapter 9 Objectives Define privacy and fundamental computer-related privacy challenges Privacy principles and laws Privacy precautions for web surfing Spyware Email privacy Privacy concerns in emerging technologies rom Security in Computing, Fifth Edition, by Charles P. Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Chapter 9 Objectives • Define privacy and fundamental computer-related privacy challenges • Privacy principles and laws • Privacy precautions for web surfing • Spyware • Email privacy • Privacy concerns in emerging technologies 2

3 What Is Privacy Privacy is the right to control who knows certain aspects about you, your communications, and your activities Types of data many people consider private Identity Finances Health Biometrics Privileged communications Location data Subject: person or entity being described by the data Owner: person or entity that holds the data rom Security in Computing, Fifth Edition, by Charles P. Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. What Is Privacy? • Privacy is the right to control who knows certain aspects about you, your communications, and your activities • Types of data many people consider private: • Identity • Finances • Health • Biometrics • Privileged communications • Location data • Subject: person or entity being described by the data • Owner: person or entity that holds the data 3

Computer-Related Privacy Problems Data collection Advances in computer storage make it possible to hold and manipulate huge numbers of records, and those advances continue to evolve Notice and consent Notice of collection and consent to allow collection of data are foundations of privacy, but with modern data collection, it is often mpossible to know what is being collected Control and ownership of data Once a user consents to provide data, the data is out of that user's control. It may be held indefinitely or shared with other entities rom Security in Computing, Fifth Edition, by Charles P. Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Computer-Related Privacy Problems • Data collection • Advances in computer storage make it possible to hold and manipulate huge numbers of records, and those advances continue to evolve • Notice and consent • Notice of collection and consent to allow collection of data are foundations of privacy, but with modern data collection, it is often impossible to know what is being collected • Control and ownership of data • Once a user consents to provide data, the data is out of that user’s control. It may be held indefinitely or shared with other entities. 4

Fair Information Practices Data should be obtained lawfully and fairly Data should be relevant to their purposes, accurate, complete and up to date The purposes for which data will be used should be identified and that data destroyed if no longer necessary for that purpose Use for purposes other than those specified is authorized only with consent of data subject or by authority of law Procedures to guard against loss, corruption, destruction, or misuse of data should be established It should be possible to acquire information about the collection, storage, and use of personal data systems The data subjects normally have a right to access and challenge data relating to them A data controller should be designated and accountable for complying with the measures to effect these principles om Security in Computing, Fifth Edition, by Charles P. Pfleeger, et aL.(ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Fair Information Practices • Data should be obtained lawfully and fairly • Data should be relevant to their purposes, accurate, complete, and up to date • The purposes for which data will be used should be identified and that data destroyed if no longer necessary for that purpose • Use for purposes other than those specified is authorized only with consent of data subject or by authority of law • Procedures to guard against loss, corruption, destruction, or misuse of data should be established • It should be possible to acquire information about the collection, storage, and use of personal data systems • The data subjects normally have a right to access and challenge data relating to them • A data controller should be designated and accountable for complying with the measures to effect these principles 5

6 U.S. Privacy Laws The 1974 Privacy Act embodies most of the principles above but applies only to data collected by the U.s government Other federal privacy laws HIPAA (healthcare data) GLBA (financial data) COPPA (childrens web access) FERPA (student records) State privacy law varies widely rom Security in Computing, Fifth Edition, by Charles P. Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. U.S. Privacy Laws • The 1974 Privacy Act embodies most of the principles above but applies only to data collected by the U.S. government • Other federal privacy laws: • HIPAA (healthcare data) • GLBA (financial data) • COPPA (children’s web access) • FERPA (student records) • State privacy law varies widely 6

7 Non-US. Privacy Principles European Privacy Directive(1995) Applies the Ware Committee's principles to governments and businesses Also provides for extra protection for sensitive data, strong limits on data transfer, and independent oversight to ensure compliance A list of other nations privacy laws can be found at http://www.informationshield.com/intprivacylaws.html rom Security in Computing, Fifth Edition, by Charles P. Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Non-U.S. Privacy Principles • European Privacy Directive (1995) • Applies the Ware Committee’s principles to governments and businesses • Also provides for extra protection for sensitive data, strong limits on data transfer, and independent oversight to ensure compliance • A list of other nations’ privacy laws can be found at http://www.informationshield.com/intprivacylaws.html 7

8 Privacy-Preserving Data Mining Removing identifying information from data doesnt work Even if the overtly identifying information can be removed, identification from remaining data is often possIble Data perturbation As discussed in Chapter 7, data perturbation can limit the privacy risks associated with the data without impacting analysis results Data mining often focuses on correlation and aggregation, both of which can generally be reliably accomplished with perturbed data rom Security in Computing, Fifth Edition, by Charles P. Pfleeger, et aL. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Privacy-Preserving Data Mining • Removing identifying information from data doesn’t work • Even if the overtly identifying information can be removed, identification from remaining data is often possible • Data perturbation • As discussed in Chapter 7, data perturbation can limit the privacy risks associated with the data without impacting analysis results • Data mining often focuses on correlation and aggregation, both of which can generally be reliably accomplished with perturbed data 8

9 Precautions for Web Surfing Cookies Cookies are a way for websites to store data locally on a user's machine They may contain sensitive personal information, such as credit card numbers Third-party tracking cookies Some companies specialize in tracking users by having numerous popular sites place their cookies in users browsers This tracking information is used for online profiling, which is generally used for targeted advertising Web bugs A web bug is more active than a cookie and has the ability to immediately send information about user behavior to advertising services om Security in Computing, Fifth Edition, by Charles P. Pfleeger, et aL.(ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Precautions for Web Surfing • Cookies • Cookies are a way for websites to store data locally on a user’s machine • They may contain sensitive personal information, such as credit card numbers • Third-party tracking cookies • Some companies specialize in tracking users by having numerous popular sites place their cookies in users’ browsers • This tracking information is used for online profiling, which is generally used for targeted advertising • Web bugs • A web bug is more active than a cookie and has the ability to immediately send information about user behavior to advertising services 9

Spyware Spyware is code designed to spy on a user, collecting data General spyware Advertising applications, identity theft Hijackers: Hijack existing programs and use them for different purposes, such as reconfiguring file sharing software to share sensitive information Adware Displays selected advertisements in pop-up windows or the main browser window Often installed in a misleading way as part of other software packages om Security in Computing, Fifth Edition, by Charles P. Pfleeger, et aL.(ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reserved
From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved. Spyware • Spyware is code designed to spy on a user, collecting data • General spyware: • Advertising applications, identity theft • Hijackers: • Hijack existing programs and use them for different purposes, such as reconfiguring file sharing software to share sensitive information • Adware • Displays selected advertisements in pop-up windows or the main browser window • Often installed in a misleading way as part of other software packages 10
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第08章 密码学精讲 Details of Cryptography.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第07章 安全管理与事件 Management and Incidents.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第06章 网络 Networks.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第03章 程序与编程 Programs and Programming.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第05章 数据库 Databases.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第04章 操作系统 Operating Systems.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第02章 工具箱:鉴别、访问控制与加密 Toolbox:Authentication, Access Control, and Cryptography.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第01章 概论 Introduction.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——端口扫描与嗅探实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——网络监视实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第三章 网络分析实验——数据包捕获实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第八讲 主机探测及端口扫描实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第七讲 WEB漏洞渗透实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第六讲 入侵检测实验——基于虚拟蜜网的网络攻防实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第六讲 入侵检测实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第五讲 防火墙实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第四讲 协议与内容安全实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第十一章 网络服务扫描实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第十章 邮件钓鱼社会工程学实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(实验指导)第九章 口令破解及安全加密电邮实验.pptx
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第10章 浏览器 The Web—User Side.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第12章 新兴问题 Emerging Topics.pdf
- 河南中医药大学:《信息安全网络与网络安全》课程教学资源(英文讲稿)第11章 云计算 Cloud Computing.pdf
- 河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(实验课程教学大纲).pdf
- 河南中医药大学:《云计算与虚拟化技术 Cloud and virtualization technology》课程教学资源(理论课程教学大纲).pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:The Complete VMware vSphere Guide:Design a Virtualized Data Center with VMware vSphere 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:4 Reasons to Embrace Multi-Cloud with Network Virtualization.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:IDC:The Business Value of VMware NSX Advanced Load Balancer.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Mastering VMware vSphere 6.7, 2nd Edition.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Mastering VMware vSphere 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》教学资源(参考资料)Mastering VMware vSphere 6.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Network Virtualization for Dummies.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Optimizing Remote Worker Connectivity to Cloud Applications Using SD-WAN Gateways.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware NSX Data Center.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vSphere 功能特性比较.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:WHAT'S NEW IN VMWARE vSPHERE 6.7.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:Worldwide Cloud System and Service Management Software Market Shares, 2019:SaaS and ITOM Drive Growth.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 1.入门-vRealize-Log-Insight-4.7-getting-started-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 2.管理 vRealize Log Insight-vRealize-Log-Insight-4.7-administration-guide.pdf
- 《云计算与虚拟化技术 Cloud and virtualization technology》参考资料:VMware vRealize Log Insight 4.7 CHS 3.使用 vRealize Log Insight-vRealize-Log-Insight-4.7-users-guide.pdf