CSE101 Chapter 4 Digital Security Privacy and Law 1
CSE101 Chapter 4 Digital Security Privacy and Law 1
CSE101 Chapter 4 Digital Security Privacy and Law 1
CSE 101
Digital Security
What Why
Digital security is the protection of Protecting the confidentiality
our online identity. is an all- Preserving the integrity of information assets
encompassing term which includes
the tools you can use to secure your Type
identity, assets and technology in the
online and mobile. These tools you can Inappropriate Digital Security- Users fail to maintain
use to protect your identity and secure current software updates or patches that protect their
personal devices you carry with you computers
everyday.
Appropriate Digital Security- Users take the time to make
sure their virus protection and firewalls are properly
undated and configured
01/13
Digital Footprint
What Why How
Your digital footprint is all The web is listening every Websites And Online
the stuff you leave behind time you use it! It’s Shopping
as you use the Internet. important that you Social Media
Comments on social understand what you’re Mobile Phones, Tablets, or
media, Skype calls, app leaving behind when you visit Laptops
use and email records- it’s a website.
part of your online history
and can potentially be seen
by other people, or tracked Don’t forget to clean your digital footprint !
in a database.
02/13
Malware ?
What Types How
“Malware” is short for “malicious Virus Step1: Don’t trust strangers online!.
software” – computer programs Trojans
designed to infiltrate and damage Spyware Step2:Double check your downloads!
computers without the users Worms
consent. “Malware” is the general Ransomware Step 3: Avoid logging into accounts
term covering all the different types during malware removal.
of threats to your computer safety.
Step 4: Check your activity monitor.
03/13
Safe Browsing
Different ways of safe browsing
04/13
Social networking, emails and online
transactions
Beware of suspicious Do not hand over any
links important information to
websites without HTTPS
Disposable email enabled
account for shopping and
other activities Enable Two-factor
authentication (2FA)
05/13
Mobile Security
Tips you can follow
Install an antivirus
06/13
What if you lose your phone or computer!
Think about the data you would lose What about all your personal stuff Are you Worried?
07/13
Precautions
Lock down your phone-
* Strong password with biometric
(fingerprint or face) login
* Set up your phone’s remote-tracking
feature
08/13
Social Media Past
We’ve all looked back on our past selves and
wondered what the heck were we thinking? In some
respects, it’s good to reflect every once in a while,
because it’s a reminder of how much we’ve grown
and matured over the years.
09/13
Delete Uncomfortable Post
Why
It’s safer
10/13
Security vs Privacy
“The Digital Security Act 2018”
Privacy Security
Safeguarding of user Safeguarding of data
identity
It’s the state of being
The state of being free free from potential threats
from unwanted attention or dangers
and secret surveillance
Personal freedom from
Right to freedom from external forces
intrusion and prying eyes
It is possible to have security without privacy, but impossible to have privacy without security.
11/13
Discussion
How concerned are you about your
digital privacy?
12/13
13/13