Freedom of expression - It enables the free Roe v.
Wade - Privacy within the realm of
exchange of ideas, opinions, and information decision
and thus allows members of society to form
their own opinions on issues of public
importance. HTTP - cookie is data stored on a user's
- serves public debate and supports a free computer that assists in automated access to
and independent press, informed websites or web features, or other state
citizenship and the transparent information required in complex websites.
functioning of the state.
-
Flash cookies, also known as local shared
Spaces (public and private)
objects, work the same ways as normal
Purposes (political, artistic and commercial)
cookies and are used by the Adobe Flash
Forms (words, pictures and sounds)
Player to store information on the user's
Media (films, cartoons, radio, television and
computer.
social media)
Restrictions - measures that restrict freedom Evercookies, created by Samy Kamkar, are
of expression be stated in law, can only be JavaScript-based applications that produce
applied for valid reasons (legitimate aim), cookies in a web browser that actively
and must be an exception based on the "resist" deletion by redundantly copying
individual situation. Violations of private themselves in different forms on the user's
life Defamation, Hate speech, Obscenity, machine (e.g., Flash Local Shared Objects,
Pornography, Public order, National various HTML5 storage mechanisms,
security, Classified information, Trade window. name caching, etc.), and
secrets or copyright violations. resurrecting copies that
Internet privacy - is a subset of data
privacy. Information Privacy - is an Device fingerprint - information collected
individual's claim to control the terms under about the software and hardware of are mote
which personal information identifiable to computing device to identify individual
the individual--is acquired, disclosed, and devices even when persistent cookies (and
used. also zombie cookies) can't be read or stored
PII - any information that can be used to in the browser, the client IP address is
identify an individual. hidden, and even if one switches to another
browser on the same device. are missing or
Bruce Schneier - "The Value of expired.
Privacy","Privacy protects us from abuses
by those in power, even if we're doing
nothing wrong at the time of surveillance." Third-Party Requests - HTTP data
connections from client devices to addresses
on the web that are different from the
Jerry Kang - privacy expresses space, website the user is currently surfing on.
decision,and information. In terms of space,
individuals expect that their physical space
(e.g. homes, cars) not be intruded. Mug-shot publishing sites - people
depicted in these photos might not want
them to appear on the Internet.
Street View disseminates information, the which started in 2005. The search engine
photograph, is very immediate in the sense follows a slightly different approach to the
that it can potentially provide direct two previous ones, using a peer-to-peer
information and evidence about a person's principle that does not require any stationary
whereabouts, activities, and private property. and centralized servers. This has its
disadvantages but also the simple advantage
of greater privacy when surfing due to no
Search engines - track a user's searches. possibility of hacking.
Personal information can be revealed
through searches by the user's computer,
account, or IP address being linked to the Search Encrypt is an internet search engine
search terms used. that prioritizes maintaining user privacy and
avoiding the filter bubble of personalized
search results. It differentiates itself from
DuckDuckGo- meta-search engine that other search engines by using local
combines the search results from various encryption on searches and delayed history
search engines (excluding Google) and expiration.
provides some unique services like using
search boxes on various websites and
providing instant answers out of the box. Tor Browser (The Onion Router) is free
software that provides access to an
anonymized network that enables
Qwant - an EU-based web search engine anonymous communication. It directs the
that focuses on privacy. It has its index and internet traffic through multiple relays. This
has servers hosted in the European Union. encryption method prevents others from
tracking a certain user, thus allowing the
user's IP address and other personal
Fireball - Germany's first search engine and
information to be concealed.
obtains web results from various sources
(mainly Bing).
Web 2.0 is the system that facilitates
participatory information sharing and
MetaGer is a meta-search engine (obtains
collaboration on the internet, in social
results from various sources) and in
networking media websites like Facebook,
Germany by far the most popular safe search
Instagram, Twitter, and MySpace.
engine. MetaGer uses similar safety features
as Fireball.
HTML5 is the latest version of Hypertext
Markup Language specification. HTML
IxQuick is a Dutch-based meta-search
defines how user agents, such as web
engine (that obtains results from various
browsers, are to present websites based upon
sources). It commits also to the protection of
their underlying code.
the privacy of its users. Ixquick uses similar
safety features as Fireball.
Big data - The data is large (often exceeding
exabytes) and cannot be handled by
Yancy is a decentralized search engine
conventional computer processors, and is
developed based on a community project,
instead stored on large server-system
databases. This information is collected Cybercrime ranges - crimes that involve
from all around the internet, such as by fundamental breaches of personal or
popular services like Facebook, Google, corporate privacy, such as assaults on the
Apple, Spotify or GPS systems. integrity of information held in digital
depositories and the use of illegally obtained
digital information to blackmail a firm or
Cross-device tracking identifies users' individual.
activity across multiple devices.
Computer security, also known as
Malware is a term short for "malicious cybersecurity or IT security, is the protection
software" and is used to describe software to of information systems from theft or damage
causes damage to a single computer, server, to the hardware, the software, and to
or computer network whether that is through information on them, as well as from
the use of a virus, trojan horse, spyware, etc. disruption or misdirection of the services
they provide.
Spyware is a piece of software that obtains
information from a user's computer without Backdoor - a cryptosystem or an algorithm,
that user's consent. is any secret method of bypassing normal
authentication or security controls.
Web bug is an object embedded into a web
page or email and is usually invisible to the Denial of service attacks (DoS) are
user of the website or reader of the email. It designed to make a machine or network
allows checking to see if a person has resource unavailable to its intended users.
looked at a particular website or read a
specific email message.
Direct-Access Attacks - An unauthorized
user gaining physical access to a computer is
Phishing is a criminally fraudulent process most likely able to directly copy data from
of trying to obtain sensitive information it. They may also compromise security by
such as user names, passwords, credit cards making operating system modifications,
or bank information. Phishing is an internet installing software worms, keyloggers,
crime in which someone masquerades as a covert listening devices or using wireless
trustworthy entity in some form of electronic mice.
communication.
Eavesdropping is the act of surreptitiously
WebRTC is a protocol that suffers from a listening to a private computer
serious security flaw that compromises the "conversation" (communication), typically
privacy of VPN tunnels, by allowing the true between hosts on a network.
IP address of the user to be read. It is
enabled by default in major browsers such as
Firefox and Google Chrome. Spoofing is the act of masquerading as a
valid entity through falsification of data
(such as an IP address or username), to gain
access to information or resources that one is LIABILITY: Liability is a feature of the
otherwise unauthorized to obtain. political systems in which a body of laws
permits individuals and firms to recover
damages to them by other actors, systems or
Email spoofing, where an attacker forges organizations.
the sending (From, or source) address of an
email.
DUE PROCESS: This is a related feature of
law-governed societies and is a process in
IP address spoofing, where an attacker which laws are well known and understood
alters the source IP address in a network and there is an ability to higher authorities.
packet to hide their identity or impersonate
another computing system.
R.A. 8792 "An Act Providing For The
Recognition And Use of Electronic
MAC spoofing, where an attacker modifies Commercial And Non-Commercial
the Media Access Control (MAC) address of Transactions, Penalties For Unlawful Use
their network interface to pose as a valid Thereof, And Other Purposes, also known as
user on a network. the "Electronic Commerce Act.
Biometric spoofing, where an attacker DoS—An attempt to interrupt or suspend
produces a fake biometric sample to pose as host services of an Internet-connected
another user. machine causing network resources, servers,
or websites to be unavailable or unable to
function.
Tampering describes a malicious
modification or alteration of data. So-called
Evil Maid attacks and security services DDoS—Distributed denial of service attack.
planting of surveillance capability into A DoS attack that occurs from multiple
routers are examples. sources.
“Data Privacy Act of 2012”. It is the policy Malware—An overarching term describing
of the State to protect the fundamental hostile and/or intrusive software including
human right of privacy, of communication (but not limited to) viruses, worms, Trojans,
while ensuring free flow of information to ransomware, spyware, adware, scareware,
promote innovation and growth. and other more, taking the form of
executables, scripts, and active content.
RESPONSIBILITY: This means that you
accept the potential costs, duties and Phishing—An attempt to acquire sensitive
obligations for the decisions you make. information like usernames, passwords, and
credit card details for malicious purposes by
masquerading as a trustworthy entity in a
ACCOUNTABILITY: It means
digital environment.
mechanisms are in place for identifying who
took responsible actions and who are the
responsible parties.
Rootkit—Trojans that conceal objects or Trade Secrets. State and federal trade secret
activities in a device’s system, primarily to laws protect sensitive business information.
prevent other malicious programs from
being detected and removed
Right of Privacy. Although not part of
intellectual property laws, state privacy laws
Social Engineering—Non-technical preserve the right of all people to be left
malicious activity that exploits human alone. Invasion of privacy occurs when
interaction to subvert technical security someone publishes or publicly exploits
policy, procedures, and programs, to gain information about another person’s private
access to secure devices and networks. affairs.
Trojan—Malicious, non-replicating Deep web refers to anything on the internet
programs that hide on a device as benign that is not indexed by and, therefore,
files and perform unauthorized actions on a accessible via a search engine like Google.
device, such as deleting, blocking, Deep web content includes anything behind
modifying, or copying data, hindering a paywall or requires sign-in credentials.It
performance, and more. also includes any content that its owners
have blocked web crawlers from indexing.
Estimates place the size of the deep web at
Zero-Day Vulnerability—a security gap in between 96% and 99% of the internet.
software that is unknown to its creators,
which is hurriedly exploited before the
software creator or vendor patches it. Dark web is a subset of the deep web that is
intentionally hidden, requiring a specific
browser—Tor—to access. most estimates
Copyright. Federal copyright law protects put it at around 5% of the total internet.
original creative works such as paintings,
writing, architecture, movies, software,
photos, dance, and music. A work must meet
certain minimum requirements to qualify for
copyright protection. The length of
protection also varies depending on when
the work was created or first published.
Trademark. Brand names such as Nike and
Apple, as well as logos, slogans, and other
devices that identify and distinguish
products and services, are protected under
federal and state trademark laws.
Right of Publicity. A patchwork of state
laws known as the right of publicity protects
the image and name of a person.