Privacy, Security & Ethics

Cards (26)

  • Privacy
    The ability to control when, how, and whom our personal information is used
  • This is just a sample. Please create your own Mentimeter for your sections.
  • Flipped Classroom
    1. Lecturers will send the video links to the students prior the class
    2. Video 1: Social Media Data Privacy Awareness
    3. Video 2: Spyware
    4. Video 3: Protecting Personal Privacy
  • Privacy Concerns
    • Accuracy
    • Property
    • Access
  • Accuracy
    The data given is inaccurate
  • Property
    Even the data is belonged to Adam, he cannot change the data since only certain Finance staff are given the rights to make changes to the database
  • Access
    Only certain Finance staff are given the rights to make changes to the database
  • Data Brokers
    A business that collects personal data from various sources, processes it, and sells it to individuals or companies for marketing, risk mitigation, and other purposes
  • Common avenues for data sourcing
    • Credit cards
    • Web browser cookies
    • Public records
    • Retailers
    • Mobile apps
  • Security
    Concerns with safeguarding data, hardware, and software against misuse and harm from natural catastrophes, sabotage, and invasions
  • Cybersecurity Threats
    • Cookies
    • Web Browsing History
    • Rogue Wi-Fi Hotspot
    • Spyware
    • Malware
    • Denial-of-Service (DoS) Attack
    • Internet Scam - Phishing
  • Web Browsing History
    A list of recently visited web sites. Anyone with access to system may be able to see what sites you visited. An attacker may be able to launch a phishing or social engineering attack using the additional information they can obtain from access to your browsing history.
  • Rogue Wi-Fi Hotspot
    An open hotspot that is similar to that of the legitimate hotspot, where hackers are setup to lure people into connecting to their network. They then can access one's data and even be able to inject malware into your connected device.
  • Spyware
    Malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Violate your privacy.
  • Types of Malware
    • Web Bug
    • Keystroke Logger
    • Ransomware
    • Trojan Horse
    • Worm
    • Adware
    • Rootkit
  • Denial-of-Service (DoS) Attack

    Targets to shut down a machine or network or system, making it inaccessible to its intended users. The attack achieves this by flooding the target with a lot of traffic until the system congested or stop.
  • Distributed denial-of-service (DDoS) attack
    A variant of DoS attack that employs very large numbers of attacking computers to overwhelm the target with bogus traffic. DDoS attacks use an army of zombie devices called a botnet.
  • Internet Scam - Phishing
    Someone use the Internet service or software to cheat or take advantage of a victim, typically for financial gain. Phishing is the most common method of scam. A target is contacted via email, telephone or text message by someone posing as a legitimate institution to trap an individual into providing confidential data such as bank account no, credit card details or password.
  • Phishing Tips & Advice
    • Do not click any link from unknown phone number or e-mail address
    • Make sure the Internet banking website address is correct. Bookmark the address in your browser
    • Make sure your security phrase/image is correct before entering the password
  • Social Networking Risks
    Once information is posted to a social networking site, it is no longer private. The more information you post, the more vulnerable you may become. Even when using high security settings, friends or websites may unintentionally leak your information.
  • Access Restrictions - Strong Password
    Use a strong password
  • Access Restrictions - Biometric Technologies
    Use biometric technologies
  • Encryption
    Converting data into a specific set of codes or unrecognized form with the only authorized party that can view and have access to the encryption
  • When to use encryption?

    Protect sensitive data
  • Treats all parties fairly, Surah An-Nisa' (4:58): 'Trustworthiness in protecting and securing, Surah Al-Mukminun (23:8)'
  • This game teaches what information should be kept private and secure, and what you can do to maintain it that way. You can claim certificate upon completion of the game.