Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
Online Privacy: Making Smart Choices

Online Privacy: Making Smart Choices

Ratings: (0)|Views: 4|Likes:
Published by UTHSC Libraries
The handout from our most recent Technology Brownbag on online privacy and decision making.
The handout from our most recent Technology Brownbag on online privacy and decision making.

More info:

Published by: UTHSC Libraries on Apr 14, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/12/2014

pdf

text

original

 
Online
 
Privacy:
 
Making
 
Smart
 
Choices
 
Tips
 
and 
 
Resources
 
Key
 
Terms:
 
 
Antivirus
 
Protection
 
with
 
firewall
 
 –
 
used
 
to
 
prevent,
 
detect,
 
and
 
remove
 
malware
 
 
Cloud
 
Computing
 
 –
 
resources,
 
applications,
 
software,
 
and
 
information
 
are
 
accessible
 
through
 
the
 
Internet
 
(Google
 
Docs,
 
Livemail;
 
Yahoo
 
email,
 
SlideRocket)
 
 
Encryption
 
 –
 
The
 
process
 
of 
 
protecting
 
information
 
as
 
it
 
moves
 
from
 
one
 
computer
 
to
 
another
 
to
 
prevent
 
unauthorized
 
access
 
by
 
a
 
third
 
party
 
(HTTPS,
 
public
key
 
encryption)
 
 
Geolocation
 
 –
 
use
 
of 
 
IP
 
address,
 
mobile
 
signal
 
triangulation,
 
or
 
GPS
 
data
 
to
 
identify
 
the
 
geographical
 
location
 
of 
 
a
 
computer,
 
phone,
 
or
 
device
 
connected
 
to
 
the
 
Internet
 
 
GPS
 
(Global
 
Positioning
 
System)
 
 –
 
navigation
 
system
 
provided
 
by
 
satellites
 
to
 
portable
 
devices
 
and
 
phones
 
 
Identity
 
theft
 
 –
 
fraud
 
committed
 
by
 
using
 
another
 
person’s
 
identifying
 
information
 
without
 
their
 
awareness,
 
permission
 
or
 
authority
 
(or
 
trafficking
 
in
 
personal
 
identifying
 
information)
 
 
IP
 
(Internet
 
Protocol)
 
address
 
 –
 
a
 
unique
 
numerical
 
label
 
assigned
 
to
 
computers
 
when
 
on
 
the
 
Internet;
 
can
 
reveal
 
information
 
about
 
Internet
 
provider,
 
including
 
geographic
 
location
 
 
ISP
 
(Internet
 
Service
 
Provider)
 
 –
 
company
 
that
 
offers
 
access
 
to
 
the
 
Internet;
 
may
 
provide
 
email
 
accounts
 
 
Malware
 
(malicious
 
software)
 
 –
 
designed
 
to
 
infiltrate
 
and
 
harm
 
a
 
computer
 
system
 
without
 
the
 
owner’s
 
informed
 
consent;
 
computer
 
virus,
 
worms,
 
Trojan
 
horses,
 
etc.
 
 
Phishing
 
 –
 
An
 
online
 
scam
 
in
 
which
 
the
 
perpetrator
 
sends
 
out
 
a
 
large
 
number
 
of 
 
legitimate
 
looking
 
e
mails
 
that
 
appear
 
to
 
come
 
from
 
respected
 
companies
 
(such
 
as
 
Citibank,
 
eBay,
 
PayPal,
 
MSN,
 
Amazon.com,
 
Yahoo,
 
BestBuy,
 
AOL,
 
etc.)
 
with
 
the
 
intent
 
of 
 
"fishing"
 
for
 
personal
 
and
 
financial
 
information
 
from
 
the
 
recipient.
 
 
Privacy
 
Policy
 
 –
 
is
 
a
 
legal
 
document
 
that
 
discloses
 
some
 
or
 
all
 
of 
 
the
 
ways
 
a
 
party
 
gathers,
 
uses,
 
discloses
 
and
 
manages
 
a
 
customer's
 
data
 
 
Shoulder
 
Surfing
 
 –
 
a
 
common
 
technique
 
for
 
gathering
 
private
 
information
 
about
 
individuals
 
by
 
watching
 
their
 
computer
 
screens
 
or
 
eavesdropping
 
on
 
their
 
conversations
 
 
Social
 
Engineering
 
 –
 
a
 
variety
 
of 
 
techniques
 
used
 
to
 
gain
 
access
 
to
 
private
 
information
 
by
 
gaining
 
an
 
individual’s
 
trust
 
through
 
misrepresentation
 
or
 
social
 
manipulation
 
UT
 
Health
 
Science
 
Center
 
Libraries
 
Page
 
1
 
of 
 
1
 
4/13/2010
 
dw
 
 
UT
 
Health
 
Science
 
Center
 
Libraries
 
Page
 
2
 
of 
 
2
 
4/13/2010
 
dw
 
 
Spam
 
 –
 
 junk
 
mail
 
received
 
electronically;
 
various
 
types
 
 –
 
email,
 
instant
 
messaging,
 
newsgroup,
 
mobile
 
phone,
 
online
 
game
 
messaging,
 
etc.
 
 
Spoofing
 
 –
 
A
 
spoof 
 
website
 
is
 
one
 
that
 
imitates
 
a
 
popular
 
company's
 
Web
 
site
 
to
 
lure
 
you
 
into
 
disclosing
 
confidential
 
information,
 
often
 
by
 
using
 
logos,
 
names,
 
and
 
graphics.
 
 
Spyware
 
 –
 
collects
 
information
 
about
 
users
 
without
 
their
 
knowledge;
 
usually
 
hidden
 
from
 
user
 
and
 
difficult
 
to
 
detect;
 
type
 
of 
 
malware
 
Resources:
 
 
Internet
 
Fraud
 
Tips
 
 –
 
 
U.S.
 
Department
 
of 
 
Justice
 
 –
 
Fraud
 
Selection
 
 –
 
 
Federal
 
Trade
 
Commission
 
 –
 
Computers
 
&
 
the
 
Internet
 
 –
 
Privacy
 
and
 
Security
 
 
OnGuard
 
Online
 
 –
 
 
Snopes.com
 
 –
 
Urban
 
Legend
 
Encyclopedia
 
 
Attorney
 
General
 
of 
 
Texas
 
 –
 
Consumer
 
Protection
 
 
Additional Resources and Helpful Reads
For
 
access
 
to
 
more
 
resources
 
about
 
online
 
privacy
 
please
 
visit
 
the
 
following
 
link:
 
http://delicious.com/tag/uthsclib+etbb+smartchoices
 
The
 
librarians
 
have
 
included
 
links
 
to
 
several
 
articles
 
about
 
online
 
privacy
 
you
 
may
 
find
 
useful.
 
Remember
 
to
 
check
 
back
 
regularly
 
as
 
we
 
will
 
continue
 
to
 
add
 
links
 
to
 
this
 
page.
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->