Privacy and Security on the Internet
 
 

Privacy and Security on the Internet

Lawrence E. Widman, MD, PhD
Division of Cardiology
University of Texas Health Science Center
San Antonio, TX 78284
 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Outline

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Why be Concerned?

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Threats and Responses

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Examples of Threats

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Technology for Your Protection

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Encryption

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Public Key - Private Key Encryption

Public Key
Private Key
Anyone can encrypt files with key. No one can decrypt them with it.
This key decrypts files encoded with the public key.
 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Digital Signatures

Public Key
Private Key
Anyone can verify that the private key signed a file or message. No one can sign with this key.
This key creates a digital signature for files and messages.
 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 

 
 

What Makes Encryption Secure?

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 

 
 

Security and Key Length

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Certificates of Authority

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Common Threats and Responses: General Measures

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Common Threats and Responses: Someone Guesses Your Password

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Common Threats and Responses: Unauthorized User Reads Your Files

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Common Threats and Responses: Viruses in Downloaded Software or in Your Email

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Common Threats and Responses: Your Email has an Unintended Audience

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Common Threats and Responses: Web Browsers

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Common Threats and Responses: Your Credit Card Number is Stolen

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Common Threats and Responses: Your Identity is Stolen

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html  
 
 
 
 
 
 
 
 

 
 

Security - Privacy from Whom?

 
 
A detailed version of this talk is available at
http://www.cardiothink.com/internet-security.html