SlideShare a Scribd company logo
How to protect your 
identity on the Internet 
and VPNs 
Iulia Porneală 
CyberGhostVPN.com
Internet in numbers 
• 7.1 Billion people in the world 
• 2.5 Billion internet users in the world
Internet in numbers 2014 
Source: wearesocial.net
Internetul in numbers 2014 
• 1.1 Billion Facebook Accounts 
Source: wearesocial.net
What does the Internet know 
about you? 
• Computers and all other devices save traffic information about 
you 
• Each servers saves a log where the following information is 
recorded: 
• Your IP address associated with the content you are interested 
about 
• Your Downloads 
• Your Clicks 
• Your Internet Service Provider can easily associate your IP 
Address with: your name, your address, your age, your phone 
number
Activities that contribute to 
defining your online identity 
• Website navigation 
• Using a Search Engine 
• Registering to a Social Platform 
• Connecting your phone number to 
your accounts 
Every one of these activities is 
registered in a database (or several).
How is your online identity 
identified 
• Internet users are identified by their IP address alocated by the 
Internet Service Provider. 
What is an IP? 
• There is a communication standard called Internet Protocol / IP 
• IP is a number used exclusively by all the equipment related to 
information techonology (printers, routers, modems, computers) 
which allows them to identify and communicate between them in a 
computer network. 
• IP can give all the parameters determining the location of the 
internet user. From this point of view Internet access is completely 
transparent and can be dangerous
Internet today 
• Till 10 years ago the Internet was a place of diversity where 
everything was tolerated. 
• A place where everybody was feeling safe and communicating 
in complete freedom, practicing a new type of democracy. 
• Nowadays more and more organizations, entities and persons 
are interested in analyzing the internet traffic of individual 
users. 
• Practically at this moment freedom, security and anonymity 
online are only ideals hard to reach.
Who’s interested in your identity? 
• Website owners want to know everything there is to know about your 
interests to deliver you ads suited to your wants and needs. Or, bluntly 
put, to be able to sell your data to a third party or entity that solicits 
those. 
• Store owners who practice price discrimination policies, originating 
establishments or previous behavior (recurring visitors get higher prices, 
as the probability to buy the products increases). 
Movie industries from Hollywood to Bollywood, want to know where 
and what kind of videos are you viewing. 
• Governmental authorities, like secret services, want to know where you 
live, if you are planning to relocate, what you do, what you think, your 
political beliefs, your religious views – if you agree with them or not. 
• Organized and not-so-organized criminals, are closely watching your 
moves, especially the financial ones. Business owners are followed. 
Industrial espionage has never been as easy as it is today. 
• Companies which hire can investigate the behavior of their future 
candidates and choose discriminatory according the private life 
information of the applicant.
Comparison virtual identity 
versus real-life identity 
• If in real life we have organic systems that help us cope with 
dangers (hormonal, lizard brain, primary instinct or whatever 
you want to call it) in our virtual life this is not valid; 
• When you talk to somebody privately in real life, and a 3rd 
person is eavesdropping, you can notice, well online you have 
no idea when that is happening
Facebook 
• Facebook tracks activities for its users even when these are not 
logged in anymore. There are transmited towards the Facebook 
servers informations regarding your IP address and all websites that 
have a Like or Recommend button integrated. 
• The tracking is done based on cookies which remain in your browser 
even after logging off Facebook. The only method to stay safe is by 
periodically deleting these cookies, using different browsers or 
special apps that prevent this. 
• Facebook does not delete the information the users delete. Even 
the ones who have deleted their accounts are still monitored. 
• Both the website and mobile apps from Facebook are permanently 
monitoring your location. It seems that retaining users coordinates, 
will allow the company to sell publicity “calibrated” to the daily 
habits of the users.
Online Privacy 
• In current context, it is obvious to everybody that online 
privacy is a simple illusion. 
• You need to start from the premise that nothing we are doing 
online does not belong exclusively to us, that in the moment 
we share something, this thing is possible to be not only 
viewed by the recipient, but by many others also.
Methods to stay anonymous 
• If you use social networks, or other websites where your data is required, use 
aliases and not your real name 
• Use Security Questions instead of alternative email addreses 
• Make sure that the passwords you use are secure and different for every account 
• Use a disposable email address 
• Avoid using Google Search (you can use DuckDuckGo as an alternative search 
engine) 
• Avoid using websites which request your phone number, or at least do not 
provide it to them 
• Do not link your accounts between them 
• Check that all payment pages start with HTTPS 
• If you need to make online payments, use alternative methods to credit 
cards(paysafecard, Paypal) 
• Regularly update your operating system and antivirus 
• Use a firewall 
• Restrict remote access, except for very secure sources 
• Download only from trusted websites and sources 
• Install a VPN
What is a VPN? 
• A VPN or Virtual Private Network is a method used to add 
security and privacy to private and public networks, like WiFi 
Hotspots and the Internet. 
• A virtual private network (VPN) extends a private network 
across a public network, such as the Internet. 
• VPN enables a computer to send and receive data across 
shared or public networks as if it is directly connected to the 
private network, while benefiting from the functionality, 
security and management policies of the private network. 
• A VPN is created by establishing a virtual point-to-point 
connection through the use of dedicated connections, virtual 
tunneling protocols, or traffic encryptions.
How does a VPN work?
Encryption 
• In cryptography, encryption is the process of encoding messages or 
information in such a way that only authorized parties can read it. 
• Encryption does not of itself prevent interception, but denies the 
message content to the interceptor.
What are the advantage of 
using a VPN? 
• You can protect your online identity 
• You can get access to content and websites that are otherwise 
restricted (at the office, at school, in political context) 
• You surf the Internet seen as a user of the country of the IP you are 
using 
• Your internet identity becomes anonymous 
• You can view georestricted content (videos from Youtube, 
www.cbs.com, www.hulu.com) 
• Using wireless networks in public spaces without worries
Cybercrime 
The term of cybercrime is applied in the case of 3 categories of plică în 
cazul a trei categorii de criminal activities 
• The first category includes traditional form of crime like fraud or forgery, 
although in the case of cybercrime the context refers especially to the 
crimes committed using electronic communication networks and 
informational systems (electronic networks) 
• Second category includes publishing of illegal content in electronic 
environments (for example materials regarding child sexual abuse or 
incitement to racial hatred) 
• Third category includes crimes referring directly to electronic networks, 
for example attacks on the informational systems, A treia categorie 
include infracţiunile proprii reţelelor electronice , de exemplu, atacurile 
împotriva sistemelor de informare, denial of service and piracy. These 
types of attacks can target infrastructures of high importance in Europe 
and can affect the rapid alert systems from several areas, with 
potentially disastrous consequences for the entire society.
Online Censorship 
• Sorry, this website is not available in your country. 
• Online censorship represents a range from geo restrictions to 
political censorship like the Great Firewall of China. 
• Exemples: 
• In Iran Facebook is forbidden 
• In 2011 Egypt’s president, Mubarak, has banned Internet 
• In China (500 milion Internet users) Facebook, BBC, Youtube, 
Google, Twitter are banned
Victimes of the Internet 
• 35 killed journalists 
• 178 arrested journalists
Online identity theft 
• Internetul offers criminals new ways through which these can steal 
personal information and commit fraud. 
• Criminals ca use ways like spreading viruses which once they reach a 
comupter transmit username, passwords and personal details (like 
credit card details) 
• Phishing emails 
• Most of the webstes store information regarding the users, beeing 
exposed to such risks.
Edward Snowden and the 
Scandal NSA - PRISM 
• Snowden worked in the physical security department or technical 
department for the CIA and NSA 
• Until May 2013 he worked as a secret agent in the administration 
and consulting system for Booz Allen Hamilton 
• Through his job as a technical collaborator he had access to the top 
secret information of the American espionage system, of which we 
notice the ones obtained through the program of the agency NSA 
PRISM surveillance and espionage of the Internet networks 
• The program was making giants in the Internet domain like 
Microsoft, Apple or Google deliver their data to the NSA, in the basis 
of a "programatic warant " emitted by the IRS every year.
Thank you! 
@iuliamp 
Useful links 
• http://en.rsf.org/ 
• https://www.youtube.com/watch?v=dSXlKdWF5HE 
• https://www.youtube.com/watch?v=HcPLdRJyFuE 
• http://mashable.com/2013/03/27/tips-against-identity-theft/ 
How can use VPN 
• http://vimeo.com/64800089
WORKSHOP

More Related Content

PPTX
Internet Privacy
realpeterz
 
PPTX
Dark Side of the Net Lecture 4 TOR
Marcus Leaning
 
PDF
Online Privacy
IWMW
 
PPTX
Online privacy & security
Priyab Satoshi
 
PDF
Health Information Privacy and Security (October 21, 2020)
Nawanan Theera-Ampornpunt
 
PDF
Cyber crime
Rafel Ivgi
 
PPTX
Cyber crime in india
Arpan Shah
 
PPT
Cyber crime
Rohitha Sankar
 
Internet Privacy
realpeterz
 
Dark Side of the Net Lecture 4 TOR
Marcus Leaning
 
Online Privacy
IWMW
 
Online privacy & security
Priyab Satoshi
 
Health Information Privacy and Security (October 21, 2020)
Nawanan Theera-Ampornpunt
 
Cyber crime
Rafel Ivgi
 
Cyber crime in india
Arpan Shah
 
Cyber crime
Rohitha Sankar
 

What's hot (20)

PDF
SEO2India - Cyber crime
SEO2India - Devang Barot - SEO2India
 
PPTX
Cyber crime- a case study
Shubh Thakkar
 
PPTX
Cybersecurity2021
PrabhatChoudhary11
 
PDF
Cyber Security law in Bangladesh
Bangladesh Network Operators Group
 
PPT
Protecting children in cyberspace
Karnika Seth
 
PPTX
Traditional problem associated with cyber crime
vishalgohel12195
 
PPTX
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
PDF
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
PPTX
Cyber crime and issues
Roshan Mastana
 
PDF
Class 21 and 22
Dr. Ajith Sundaram
 
PPTX
Cybercrime Awareness
Sibesh Singh
 
PPTX
Cyber crime against children
Anchalanshri Dixit
 
PPTX
Internet privacy presentation
Matthew Momney
 
PPTX
cyber crime
Akash Mehta
 
PPTX
Cyber crime
MrunalBakshi
 
PPTX
Presentation on Information Privacy
Perry Slack
 
PPTX
Hacking a cause of cyber crime final
Harsha Matta
 
PPT
Computer crime
Uc Man
 
PPTX
Chapter 3
anas_desa
 
PPTX
Privacy issues and internet privacy
vinyas87
 
SEO2India - Cyber crime
SEO2India - Devang Barot - SEO2India
 
Cyber crime- a case study
Shubh Thakkar
 
Cybersecurity2021
PrabhatChoudhary11
 
Cyber Security law in Bangladesh
Bangladesh Network Operators Group
 
Protecting children in cyberspace
Karnika Seth
 
Traditional problem associated with cyber crime
vishalgohel12195
 
Cybercrime 111205224958-phpapp02
Shumail Tariq
 
Cyber Crime Types & Tips
Deepak Kumar (D3)
 
Cyber crime and issues
Roshan Mastana
 
Class 21 and 22
Dr. Ajith Sundaram
 
Cybercrime Awareness
Sibesh Singh
 
Cyber crime against children
Anchalanshri Dixit
 
Internet privacy presentation
Matthew Momney
 
cyber crime
Akash Mehta
 
Cyber crime
MrunalBakshi
 
Presentation on Information Privacy
Perry Slack
 
Hacking a cause of cyber crime final
Harsha Matta
 
Computer crime
Uc Man
 
Chapter 3
anas_desa
 
Privacy issues and internet privacy
vinyas87
 
Ad

Similar to How you can protect your online identity, online privacy and VPNs (20)

PPTX
Cyber Safety ppt.pptx
CGC Technical campus,Mohali
 
PPTX
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
PPTX
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
PDF
Securing and Safeguarding Your Library Setup
Brian Pichman
 
PPTX
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
PPTX
Introduction to Cybersecurity - Secondary School_0.pptx
ShubhamGupta833557
 
PPTX
Securing & Safeguarding Your Library Setup.pptx
Brian Pichman
 
PPTX
Cyber Safety & Cyber Crimes by me.pptx
TejasSingh70
 
PPTX
Legal And Ethical Aspects.pptx
fatimagull32
 
PPTX
Personal Internet Security Practice
Brian Pichman
 
PPTX
Kasita's presentation
Chande Kasita
 
PPTX
Lecture 6 Cybersecurity-Basics and .pptx
akatsesena2003
 
PPTX
Computer and internet fraud
Karmaveersinghsankhl
 
PPTX
Week 11- 2 computer misuse slides .pptx
hassanarif1022
 
PPTX
Protecting Yourself From Data and Identity Theft
Mary Lou Roberts
 
PDF
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
PDF
Why private search is important for everone and how you can protect your pers...
Kelly Finnerty
 
PDF
Why private search is important for everone and how you can protect your pers...
Kelly Finnerty
 
PPTX
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
 
PPTX
SAFETY, SECURITY AND ETHICS.ppttttttxxxx
anovalexter
 
Cyber Safety ppt.pptx
CGC Technical campus,Mohali
 
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
Securing and Safeguarding Your Library Setup
Brian Pichman
 
Chp-15 Cyber Safety ppt-std 11.pptx
HarishParthasarathy4
 
Introduction to Cybersecurity - Secondary School_0.pptx
ShubhamGupta833557
 
Securing & Safeguarding Your Library Setup.pptx
Brian Pichman
 
Cyber Safety & Cyber Crimes by me.pptx
TejasSingh70
 
Legal And Ethical Aspects.pptx
fatimagull32
 
Personal Internet Security Practice
Brian Pichman
 
Kasita's presentation
Chande Kasita
 
Lecture 6 Cybersecurity-Basics and .pptx
akatsesena2003
 
Computer and internet fraud
Karmaveersinghsankhl
 
Week 11- 2 computer misuse slides .pptx
hassanarif1022
 
Protecting Yourself From Data and Identity Theft
Mary Lou Roberts
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Commonwealth Telecommunications Organisation
 
Why private search is important for everone and how you can protect your pers...
Kelly Finnerty
 
Why private search is important for everone and how you can protect your pers...
Kelly Finnerty
 
Internet cybercrime,ebanking and security
Dheeraj Kumar Tiwari
 
SAFETY, SECURITY AND ETHICS.ppttttttxxxx
anovalexter
 
Ad

Recently uploaded (20)

PDF
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
PDF
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
PDF
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PPTX
Different Generation Of Computers .pptx
divcoder9507
 
PPTX
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
PPTX
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPTX
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
PPTX
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
PDF
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
PDF
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
PPTX
SEO Trends in 2025 | B3AITS - Bow & 3 Arrows IT Solutions
B3AITS - Bow & 3 Arrows IT Solutions
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PDF
Project English Paja Jara Alejandro.jpdf
AlejandroAlonsoPajaJ
 
PPTX
Crypto Recovery California Services.pptx
lionsgate network
 
PPTX
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
dagarabull
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
BGP Security Best Practices that Matter, presented at PHNOG 2025
APNIC
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
Different Generation Of Computers .pptx
divcoder9507
 
Perkembangan Perangkat jaringan komputer dan telekomunikasi 3.pptx
Prayudha3
 
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Artificial-Intelligence-in-Daily-Life (2).pptx
nidhigoswami335
 
The Latest Scam Shocking the USA in 2025.pptx
onlinescamreport4
 
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
SEO Trends in 2025 | B3AITS - Bow & 3 Arrows IT Solutions
B3AITS - Bow & 3 Arrows IT Solutions
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
Project English Paja Jara Alejandro.jpdf
AlejandroAlonsoPajaJ
 
Crypto Recovery California Services.pptx
lionsgate network
 
EthicalHack{aksdladlsfsamnookfmnakoasjd}.pptx
dagarabull
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 

How you can protect your online identity, online privacy and VPNs

  • 1. How to protect your identity on the Internet and VPNs Iulia Porneală CyberGhostVPN.com
  • 2. Internet in numbers • 7.1 Billion people in the world • 2.5 Billion internet users in the world
  • 3. Internet in numbers 2014 Source: wearesocial.net
  • 4. Internetul in numbers 2014 • 1.1 Billion Facebook Accounts Source: wearesocial.net
  • 5. What does the Internet know about you? • Computers and all other devices save traffic information about you • Each servers saves a log where the following information is recorded: • Your IP address associated with the content you are interested about • Your Downloads • Your Clicks • Your Internet Service Provider can easily associate your IP Address with: your name, your address, your age, your phone number
  • 6. Activities that contribute to defining your online identity • Website navigation • Using a Search Engine • Registering to a Social Platform • Connecting your phone number to your accounts Every one of these activities is registered in a database (or several).
  • 7. How is your online identity identified • Internet users are identified by their IP address alocated by the Internet Service Provider. What is an IP? • There is a communication standard called Internet Protocol / IP • IP is a number used exclusively by all the equipment related to information techonology (printers, routers, modems, computers) which allows them to identify and communicate between them in a computer network. • IP can give all the parameters determining the location of the internet user. From this point of view Internet access is completely transparent and can be dangerous
  • 8. Internet today • Till 10 years ago the Internet was a place of diversity where everything was tolerated. • A place where everybody was feeling safe and communicating in complete freedom, practicing a new type of democracy. • Nowadays more and more organizations, entities and persons are interested in analyzing the internet traffic of individual users. • Practically at this moment freedom, security and anonymity online are only ideals hard to reach.
  • 9. Who’s interested in your identity? • Website owners want to know everything there is to know about your interests to deliver you ads suited to your wants and needs. Or, bluntly put, to be able to sell your data to a third party or entity that solicits those. • Store owners who practice price discrimination policies, originating establishments or previous behavior (recurring visitors get higher prices, as the probability to buy the products increases). Movie industries from Hollywood to Bollywood, want to know where and what kind of videos are you viewing. • Governmental authorities, like secret services, want to know where you live, if you are planning to relocate, what you do, what you think, your political beliefs, your religious views – if you agree with them or not. • Organized and not-so-organized criminals, are closely watching your moves, especially the financial ones. Business owners are followed. Industrial espionage has never been as easy as it is today. • Companies which hire can investigate the behavior of their future candidates and choose discriminatory according the private life information of the applicant.
  • 10. Comparison virtual identity versus real-life identity • If in real life we have organic systems that help us cope with dangers (hormonal, lizard brain, primary instinct or whatever you want to call it) in our virtual life this is not valid; • When you talk to somebody privately in real life, and a 3rd person is eavesdropping, you can notice, well online you have no idea when that is happening
  • 11. Facebook • Facebook tracks activities for its users even when these are not logged in anymore. There are transmited towards the Facebook servers informations regarding your IP address and all websites that have a Like or Recommend button integrated. • The tracking is done based on cookies which remain in your browser even after logging off Facebook. The only method to stay safe is by periodically deleting these cookies, using different browsers or special apps that prevent this. • Facebook does not delete the information the users delete. Even the ones who have deleted their accounts are still monitored. • Both the website and mobile apps from Facebook are permanently monitoring your location. It seems that retaining users coordinates, will allow the company to sell publicity “calibrated” to the daily habits of the users.
  • 12. Online Privacy • In current context, it is obvious to everybody that online privacy is a simple illusion. • You need to start from the premise that nothing we are doing online does not belong exclusively to us, that in the moment we share something, this thing is possible to be not only viewed by the recipient, but by many others also.
  • 13. Methods to stay anonymous • If you use social networks, or other websites where your data is required, use aliases and not your real name • Use Security Questions instead of alternative email addreses • Make sure that the passwords you use are secure and different for every account • Use a disposable email address • Avoid using Google Search (you can use DuckDuckGo as an alternative search engine) • Avoid using websites which request your phone number, or at least do not provide it to them • Do not link your accounts between them • Check that all payment pages start with HTTPS • If you need to make online payments, use alternative methods to credit cards(paysafecard, Paypal) • Regularly update your operating system and antivirus • Use a firewall • Restrict remote access, except for very secure sources • Download only from trusted websites and sources • Install a VPN
  • 14. What is a VPN? • A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. • A virtual private network (VPN) extends a private network across a public network, such as the Internet. • VPN enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. • A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions.
  • 15. How does a VPN work?
  • 16. Encryption • In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. • Encryption does not of itself prevent interception, but denies the message content to the interceptor.
  • 17. What are the advantage of using a VPN? • You can protect your online identity • You can get access to content and websites that are otherwise restricted (at the office, at school, in political context) • You surf the Internet seen as a user of the country of the IP you are using • Your internet identity becomes anonymous • You can view georestricted content (videos from Youtube, www.cbs.com, www.hulu.com) • Using wireless networks in public spaces without worries
  • 18. Cybercrime The term of cybercrime is applied in the case of 3 categories of plică în cazul a trei categorii de criminal activities • The first category includes traditional form of crime like fraud or forgery, although in the case of cybercrime the context refers especially to the crimes committed using electronic communication networks and informational systems (electronic networks) • Second category includes publishing of illegal content in electronic environments (for example materials regarding child sexual abuse or incitement to racial hatred) • Third category includes crimes referring directly to electronic networks, for example attacks on the informational systems, A treia categorie include infracţiunile proprii reţelelor electronice , de exemplu, atacurile împotriva sistemelor de informare, denial of service and piracy. These types of attacks can target infrastructures of high importance in Europe and can affect the rapid alert systems from several areas, with potentially disastrous consequences for the entire society.
  • 19. Online Censorship • Sorry, this website is not available in your country. • Online censorship represents a range from geo restrictions to political censorship like the Great Firewall of China. • Exemples: • In Iran Facebook is forbidden • In 2011 Egypt’s president, Mubarak, has banned Internet • In China (500 milion Internet users) Facebook, BBC, Youtube, Google, Twitter are banned
  • 20. Victimes of the Internet • 35 killed journalists • 178 arrested journalists
  • 21. Online identity theft • Internetul offers criminals new ways through which these can steal personal information and commit fraud. • Criminals ca use ways like spreading viruses which once they reach a comupter transmit username, passwords and personal details (like credit card details) • Phishing emails • Most of the webstes store information regarding the users, beeing exposed to such risks.
  • 22. Edward Snowden and the Scandal NSA - PRISM • Snowden worked in the physical security department or technical department for the CIA and NSA • Until May 2013 he worked as a secret agent in the administration and consulting system for Booz Allen Hamilton • Through his job as a technical collaborator he had access to the top secret information of the American espionage system, of which we notice the ones obtained through the program of the agency NSA PRISM surveillance and espionage of the Internet networks • The program was making giants in the Internet domain like Microsoft, Apple or Google deliver their data to the NSA, in the basis of a "programatic warant " emitted by the IRS every year.
  • 23. Thank you! @iuliamp Useful links • http://en.rsf.org/ • https://www.youtube.com/watch?v=dSXlKdWF5HE • https://www.youtube.com/watch?v=HcPLdRJyFuE • http://mashable.com/2013/03/27/tips-against-identity-theft/ How can use VPN • http://vimeo.com/64800089