Form 4 Notes
Thursday                                                    09th February 2012
Privacy in IT refers to data and information privacy.

Ways Computer Technology Threaten Our Privacy:

It is done through:
electronic profile

used to identify users by web casting, ecommerce and other web applications
contain user information and are saved in the computer hard disk
used by some websites to store passwords and track how regularly we visit a website, that’s how we become potential targets for web advertisers
enable web sites to collect information about your online activities and store them for future use, then the collected details will be sold to any company that requests for it.
Electronic Profile:
electronic profile is the combining of data in a database that can be sold to the Internet by the company to the interested parties.
this database is in a form such as magazine subscription or product warranty cards that had been filled by online subscribers.
the information in electronic profile includes personal details such as your age, address and marital status.
example of electronic profile in facebook.

refers to a program that collects user information without the user’s knowledge.
can enter computers, sneaking in like a virus.
is a result of installing new programs.

Privacy can be protected by:
(a) Privacy law
The privacy laws in Malaysia emphasises on the following:
• Security Services to review the security policy
• Security Management to protect the resources
• Security Mechanism to implement the required security services
• Security Objects, the important entities within the system environment
(b) Utilities software
Example: anti-spam program, firewall, anti-spyware and antivirus.

Exercise: http://www.scribd.com/doc/80992731/Exercise-Privacy-in-computer-usage

No comments:

Post a Comment