Task – Privacy

Can we guarantee technological security?

Society cannot exist without a level of trust – we trust people to abide by law and to behave as expected providing a level of security.

Information we give willingly online, no matter how simplistic such as location at a time builds together to create a representation of our lives online. Even if we don’t give people our details.

Information we do give may be sold online to companies

Decades/years ago information about people’s behavior, weekend activity etc. wasn’t known unless speaking to the person or with them at the time. Now someone can go onto our social accounts like Facebook and Twitter too see where we were or get an overall portrayal.

 

Task 1

Out of the three options I thought the most familiar option was the one of a girl partying hard when being away from home. The threat for this would be a case of information being given away willingly when accessing social media. While they could also say things from a sense of irresponsible behavior that later on in life they wouldn’t agree with but might regret and also the same with pictures captured from having too much of a good time. The threat would be that the points of view at that time and behavior if not controlled would be documented online and out of the persons control after posting. Leading for it to be the future perspectives such as employers would be able to view the behavior from the past and decide on whether to employ you from past behavior without giving you a chance to show whether you can do the job or not. The risk though would be moderate as the more activity online the more information there is to deal with but it could also be reduced by the security settings being high so only select people in contact with is able to view the information or having a self-control over what you post.

 

Ben – Security and Anonymity Online

Security is a mindset. Defensive and offensive most dubious is offensive where thinking as a attacker

We go into anything with a preconception

Can turn things so to see how they will fail so to find the flaws

Security, Privacy and anonymity are key to trust.

Trust thousands of people each day without thinking about it

 

Privacy – A way of keeping information to who needs it.

Anonymity – have a set of privacy so that little amount of people knows who you are.

We leave a paper trail behind us. What do we want online? Privacy, anonymity, security?

We can say things online that we wouldn’t want to say publicly as identity is hidden. Anonymity or credibility?

When we send a document online we send information with it in the data.

Threat to risk matrix – how vulnerable are we? How likely is it? Consequences? – How much does the attack really matter?

Think what information you put online Why do you want anonymity – to show another point of view or privacy?

We go into risk with a set mind set so miss key information

People are bad judges of risk

We spend our time reacting. We experience things and forget so don’t realize how bad the risk is.

 

Questions from a photograph

Is there anything obvious I have missed?

What are my assumptions when I post the picture?

Who did I expect will see it if I post it more publicly?

How can the image be used, can it identify me or can I be a risk to me? We now have facial and location recognition. Location can be given, editing software, camera software on data.

An image can tell us from landmarks, foliage on trees, shadows determine time of day

 

If you decide anonymity – do your photographs support them? Can change location

Strip out meta data but still tell where you are. You may want to remove imagery – you can edit an image but then do you trust an edited photograph?

How do you expect other to trust the image?

Is it still telling a true story?

Can you tell an edited photograph – the answer is yes through some tools Should you trust an edited photograph?

This creates an assessment of yourself

Attack can happen based on people you share information with

Should be concerned are we happy to accept the risk?

 

Meta data – data describes data. Is there such thing as anonymity any more?

One mistake can give information away

Patience is key

If there’s a break then trust can become risk

There is a balance with vulnerability and trust

You can create a map of people taking pictures and be identified from others taking images around them

When considering information we don’t consider the lead up, you only consider that point

We have to fixate on the parts we don’t consider

As soon as something is posted, you’ve lost control of it unless sharing is limited.

Limited information on its own may be little but put together it can give away your identity.

We get a filtered world through the Internet.

Do we have the right for data stored in other countries?

Make sure your computer is always security is updated; always use different passwords for everything.

Be aware of meta data

It can be more riskier to not understand something than not use it at all

 

This task made me think about how I use the internet, as like everyone else I use the internet as a typical tool and for a source of entertainment through social media. Leading me to post things that I may be embarrassed by years down the line, my point of view over time could also change. Before hand these points would not have been considered later down the line but instead nowadays anything we say online can be located and no matter how innocent it is can later have an impact on the prospects. This though is never thought about when posting things and I like many may have been guilty of this. However, this makes me think maybe I should reconsider what I post so that I am helping instead of hindering my future.

Advertisements

One thought on “Task – Privacy

  1. Pingback: Met of the Learning Outcomes | deanachantler

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s