The document discusses online privacy and whether it is a myth. It outlines that personal information shared online, such as names, addresses, browsing history and credit card details, can be accessed by internet service providers, websites visited, government agencies, and hackers. While companies and governments say they keep data safe, the Edward Snowden leak revealed that the NSA can access people's devices through backdoors and monitor phone calls, messages, emails and files. The document recommends using strong passwords, being wary of suspicious emails, and installing security software to help protect personal information online, but notes there may be no full protection.
The document discusses online privacy and whether it is a myth. It outlines that personal information shared online, such as names, addresses, browsing history and credit card details, can be accessed by internet service providers, websites visited, government agencies, and hackers. While companies and governments say they keep data safe, the Edward Snowden leak revealed that the NSA can access people's devices through backdoors and monitor phone calls, messages, emails and files. The document recommends using strong passwords, being wary of suspicious emails, and installing security software to help protect personal information online, but notes there may be no full protection.
The document discusses online privacy and whether it is a myth. It outlines that personal information shared online, such as names, addresses, browsing history and credit card details, can be accessed by internet service providers, websites visited, government agencies, and hackers. While companies and governments say they keep data safe, the Edward Snowden leak revealed that the NSA can access people's devices through backdoors and monitor phone calls, messages, emails and files. The document recommends using strong passwords, being wary of suspicious emails, and installing security software to help protect personal information online, but notes there may be no full protection.
PRESENTED BY: AHMAD HASSAN 2022-ME-02 WHAT IS ONLINE PRIVACY?
• ONLINE PRIVACY IS THE ABILITY TO CONTROL AND MANAGE OUR
PERSONAL INFORMATION WHEN WE USE THE INTERNET. • PERSONAL INFORMATION CAN INCLUDE OUR NAME, ADDRESS, CREDIT CARD DETAILS, BROWSING HISTORY, AND MORE. WHO SEES MY DATA? • INTERNET SERVICE PROVIDER CAN TRACK MY ALL MOVEMENTS ON SOCIAL WEBSITES. • THE SITES I VISIT ALSO HAVE ACCESS TO MY DATA. • AGENCIES ALSO TRACKS PEOPLE TO CONFIRM THERE IS NO CRIME PLANNING HAPPENING ONLINE. • TO SUM UP, EVERYTHING ABOUT ME IS IN AT LEAST ONE COMPUTER FILE. IS MY DATA SAFE?
• THE DATA IS SAFE IF IT IS NOT IN DEMAND.
• IF SOMEONE WANTS MY DATA AND HAVE MONEY, HE CAN GO TO DARK WEB FOR THIS PURPOSE. • DARK WEB IS A PLACE TO LIVE IN FOR HACKERS. • SO IF SOMEONE IS WILLING TO PAY A GOOD AMOUNT FOR YOUR DATA, THEN IT IS NOT SAFE ANYMORE. DO GOVERNMENT HAVE ACCESS TO MY DATA? • GOVERNMENT SECURITY AGENCIES LIKE THE NSA CAN ALSO HAVE ACCESS TO YOUR DEVICES THROUGH IN-BUILT BACKDOORS. • THIS MEANS THAT THESE SECURITY AGENCIES CAN TUNE IN TO YOUR PHONE CALLS, READ YOUR MESSAGES, CAPTURE PICTURES OF YOU, STREAM VIDEOS OF YOU, READ YOUR EMAILS, STEAL YOUR FILES AT ANY MOMENT THEY PLEASE. • THAT’S A LOT TO DIGEST THAT EVERYTHING I DO IS BEING MONITORED. SNOWDEN INCIDENT • EDWARD JOSEPH SNOWDEN (BORN JUNE 21, 1983) IS AN AMERICAN AND NATURALIZED RUSSIAN FORMER COMPUTER INTELLIGENCE CONSULTANT. • HE LEAKED HIGHLY CLASSIFIED INFORMATION FROM THE NATIONAL SECURITY AGENCY (NSA) IN 2013, FOR ETHICAL REASONS. • IT HAPPENED IN THE GOVERNANCE OF BARACK OBAMA. SNOWDEN(2016)
IF SOMEONE IS INTERESTED IN LEARNING
ABOUT DATA HANDLING AND MONITORING , I WOULD RECOMMEND HIM THIS MOVIE. MAKING DATA SAFE • USE STRONG PASSWORDS. • BE WARY OF SUSPICIOUS EMAILS. • INSTALL ANTI-VIRUS AND MALWARE PROTECTION. • DON'T LEAVE PAPERWORK OR LAPTOPS UNATTENDED • MAKE SURE YOUR WI-FI IS SECURE. “THE ONLY PROTECTION IS TO UNDERSTAND THAT EVERYTHING YOU PUT UP THERE CAN BE ACCESSED BY SOMEBODY ELSE”