Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Privacy in the Cybernet B95705037佘亭維 B95705061江昱其 B95705014王郁婷 Agenda Privacy in the Cybernet Categories of privacy in the cybernet How we reveal our information? Cookies What is Privacy in the cybernet? Privacy Traditional v.s Modern Categories of privacy in the cybernet Privacy of a Person's Persona Privacy of Data about a Person Privacy of a Person's Communication Privacy of a Person's Persona Live Show Web monitor Kindercam Privacy of Data about a Person What’s data about a person SPAM Privacy of a Person's Communication Sniffer peek the e-mail Cookies Cookies=Foods? Cookies are pieces of information sent by a Web server to a user’s browser. How we reveal our information? Signing up for Internet How we reveal our information? E-mail and list-serves Browsing the Internet Interactive use : Instant messages and social networks How we reveal our information? Personal web sites and blogs How we reveal our information? Managing your financial accounts and online bill payment References http://www.cyberlawyer.com.tw/alan4. html http://www.privacyrights.org/fs/fs18cyb.htm http://www.privacy.gov.au/internet/inter net_privacy/ Privacy in the Cybernet B95705037佘亭維 B95705061江昱其 B95705014王郁婷 Agenda Spyware Phishing Website introduction What is Spyware? It is a computer software that collects personal information about users without their informed consent. Categories of Spyware 間諜程式 廣告軟體 惡意撥號程式 惡作劇程式 駭客工具 遠端存取工具 密碼破解應用程式 Where is Spyware? Pop-up Advertisement Screensaver Where is Spyware? Games downloaded Music downloaded Spyware prevention Don’t reply any Ad-mail,spam, pop-up advertisement Use other browsers, ex:Firefox Install Anti-virus, ex:Spy Sweeper, Ad-Aware Phishing phreak +fishing=phishing Target:Economic website Citibank,eBay,U.S. Bank,Paypal Anti-phishing Phishing Approaches Spam MSN (Instant message) Others HTTPS=HTTP+SSL APWG Anti-Phishing Working Group MingPian.com 傳一張換兩張 總裁級人物資訊 MingPian.com References http://www.antiphishing.org/ http://cpro.com.tw/ http://www.informationsecurity.com.tw/ http://taiwan.cnet.com/ http://www.mingpian.com/ http://www.ucloo.com/ Privacy in the Cybernet B95705037佘亭維 B95705061江昱其 B95705014王郁婷 Agenda Sniffing Metadata in JPEG files Key logger Conclusion Sniffing Telephone vs Internet Web manager Military Sniffer software: Instant message sniffers Sniffing Prevention 以 arp 指令查看 arp table 資訊 聊天軟體加密傳輸 Hidden data in JPEG Files Digital cameras and image manipulation programs add hidden data to JPEG files. For different reasons, one might want to remove these data before publishing the files on the Internet. Hidden Data in JPEG Files Metadata in JPEG file: Make and model of the digital camera Time and date Distance Location information (GPS) Small preview image Others Cases and examples Collect the photos of studying companion A computer hacker was found by a disguised picture published. Uncle’s birthday party v.s. Rocking concert Hidden Data in JPEG Files How to remove Metadata C:\jpeg+Jhead.exe Metadata Exif Specification Adobe tags Keylogger Hardware Software Record and Mail Credit card number,ID,code Software introduction:Keyspy Keylogger Prevention Monitoring what programs are running Anti-spyware Firewall Network monitors Automatic form filler programs Alternative Keyboard Layouts On-screen keyboards Conclusion 科技比法律更能保護我們的隱私 References http://en.wikipedia.org/wiki/Internet_pri vacy http://www.ufasoft.com/sniffer/ http://www.awinsoft.com/