You are on page 1of 5

Brunel University

School of Engineering and Design

Daniel Teixeira de Farias


1330947

Managing your personal data in the Internet


CCN

Uxbridge London
August 2014
Author:

Daniel Teixeira de Farias


Supervisor:
Prof. Dr. Thomas Owens

Managing your personal data on the Internet CCN

Summer project present to


School of Engineering and
Design of Brunel University
as part of Science Without
Borders Program.

Uxbridge London
August 2014

Abstract

The number of internet users has grown tremendously in recent


years. It could not be different, since the numbers of services offered
are countless: we can shop online, pay bills, check the weather, and
talk to someone on the other side of the world and so on.
Unfortunately, there are some problems as well. . Internet security is
a serious problem that makes impact on nearly all segments of the
computing industry. Systems used in homes, education, business, and
government are all susceptible to invasion (1).
In this project we will focus on personal security. When we are
connected, we can also expose ourselves to risks. This has required
security enhancements to be added in the way we use the internet. A
lot of these enhancements are not implemented by default.

Summary

Chapter 1: Introduction
1.1

Motivation

1.2

Objectives

The aim of this project is to applying a series of tools related to


network security in a personal computer, as well as analyze them in
terms of usage and efficiency.
1.3 Organization
After the initial introduction, this report is divided in more four
chapters. Chapter 2 discusses the general concepts related to
individual risks when people get online in the internet.
Chapter 2: Internet Security
2.1
2.2
2.3
2.4

Introduction
History
Architecture
Tools

Chapter 3:
Chapter 4:
Chapter 5: Conclusion
References
Chapter 3:

http://www.digital-selfdefense.com / Fake It Your Guide to Digital Self-defense is a


guide to of the risks individuals take when online. The book describes how personal
data is collected, stored, mined and abused by commercial companies and shows how
the individual be active on social media and the Internet in general while protecting
their online identity and reputation. It lists a range of great tools to retain control over
personal data. This project involves applying these tools, exploring how hard they are to
use, undertaking research to identify how they work, how effective they are, and
whether alternative tools are available.
(1) http://www.cs.trinity.edu/~jhowland/security/security/
(2)

You might also like