We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byRegina Blanding
Modified about 1 year ago
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net CLASS 6 PRIVACY © 2014 Keith A. Pray
CS 3043 Social Implications Of Computing LOGISTICS We need Groups to volunteer to present Tuesday 2014-10-07. The first 3 to send the TA and me email win. Send me group web site location Please send email to both me and the TA for quickest response time Presentations are due 24 hours before class Use Presentation Guidelines on course web site © 2014 Keith A. Pray2
CS 3043 Social Implications Of Computing OVERVIEW 1. Review 2. Assignment 3. Students Present © 2014 Keith A. Pray3
CS 3043 Social Implications Of Computing © 2014 Keith A. Pray4 http://xkcd.com/1269/
CS 3043 Social Implications Of Computing MY READING NOTES pp. 231 Moral capitol – 1984? pp. 237 “…privacy…in their own homes…” != nanny to expect privacy “…when… insides Sullivans home. pp. 245 Web Browsers put cookies on on your hard drive, not Web Servers. pp. 249 why is assumption flawed? pp. 251 Are call records really a “social network”? pp. 255 Why does Apple not enforce policy of asking permission in the API? pp. 256 5. 2003 is a while ago. pp. 267 Does not answer first question. © 2014 Keith A. Pray5
CS 3043 Social Implications Of Computing ASSIGNMENT ONE PAGE PAPER Would a National ID System be a good thing? – One acceptable approach is to show the argument in the book for the position opposite to your conclusion is a weak argument. – Feel free to reference or build upon your self search work if it helps your argument. © 2014 Keith A. Pray6
CS 3043 Social Implications Of Computing OVERVIEW 1. Review 2. Assignment 3. Students Present © 2014 Keith A. Pray7
CS 3043 Social Implications Of Computing DOES THE SOFTWARE YOU USE HAVE A BACKDOOR? Android and iOS both have backdoors  Exchange  SkyDrive and Outlook.com  Many alleged backdoors in other pieces of software  –Not counting malware Nick Brown http://www.kitguru.net/wp-content/uploads/2014/05/android-ios1.jpeg © 2014 Keith A. Pray8
CS 3043 Social Implications Of Computing BACKDOORS ARE A VIOLATION OF OUR PRIVACY Private information could be exposed –Google Remote Kill and Install  –Xiaomi Phones  –Prism  Two solutions –Accept the possible privacy violations –Use transparent software http://askbobrankin.com/computer-privacy.jpg © 2014 Keith A. Pray Nick Brown 9
CS 3043 Social Implications Of Computing SOFTWARE TRANSPARENCY Transparency means letting users know exactly what software is doing Generally means making software open source  –Open source does not mean there cannot be a backdoor –Linus’s Law  –Linux backdoor attempt  Software security reviews  –Static code analysis –Audits Open source can help remove security issues –Borland InterBase/Firebird  http://opensource.org/logo-usage-guidelines http://www.defense.gov/multimedia/web_graphics/dod/DODc.gif © 2014 Keith A. Pray Nick Brown 10
CS 3043 Social Implications Of Computing CONCLUSION Software backdoors are a privacy issue that we should be worried about Closed source software cannot necessarily be trusted Open source software, while not necessarily backdoor free, is transparent about what it is doing As more people use open source software, the more likely it is that it is not doing anything suspicious. © 2014 Keith A. Pray Nick Brown 11
CS 3043 Social Implications Of Computing REFERENCES  Jon Oberheide, Remote Kill and Install on Google Android, https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on- google-android/ (September 14, 2014)https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on- google-android/  Jonathan Zdziarski, Apple Addresses iOS Surveillance and Forensics Vulnerabilities, http://www.zdziarski.com/blog/?p=3820 (September 14, 2014)http://www.zdziarski.com/blog/?p=3820  Martin Kaste, Wipeout: When Your Company Kills Your iPhone, http://www.npr.org/2010/11/22/131511381/wipeout-when-your- company-kills-your-iphone (September 14, 2014)  GNU.org, Proprietary Back Doors, http://www.gnu.org/philosophy/proprietary-back-doors.html (September 14, 2014)http://www.gnu.org/philosophy/proprietary-back-doors.html  Ed Felten, Software Transparency, https://freedom-to-tinker.com/blog/felten/software-transparency/ (September 14, 2014)https://freedom-to-tinker.com/blog/felten/software-transparency/  Scott Merrill, With Many Eyeballs, All Bugs Are Shallow, http://techcrunch.com/2012/02/23/with-many-eyeballs-all-bugs-are-shallow/ (September 14, 2014)http://techcrunch.com/2012/02/23/with-many-eyeballs-all-bugs-are-shallow/  Mohit Kumar, Xiaomi Phones Secretly Sending Users’ Sensitive Data to Chinese Servers, http://thehackernews.com/2014/08/xiaomi- phones-secretly-sending-users.html (September 15, 2014)http://thehackernews.com/2014/08/xiaomi- phones-secretly-sending-users.html  US Department of Defence, Frequently Asked Questions Regarding Open Source Software, http://dodcio.defense.gov/OpenSourceSoftwareFAQ.aspx#Frequently_Asked_Questions_regarding_Open_Source_Software_.28OSS.29_and_t he_Department_of_Defense_.28DoD.29 (September 15, 2014) http://dodcio.defense.gov/OpenSourceSoftwareFAQ.aspx#Frequently_Asked_Questions_regarding_Open_Source_Software_.28OSS.29_and_t he_Department_of_Defense_.28DoD.29  Glenn Greenwald, Microsoft handed the NSA access to encrypted messages, http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data, (September 15, 2014) http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data  Ed Felten, The Linux Backdoor Attempt of 2003, https://freedom-to-tinker.com/blog/felten/the-linux-backdoor-attempt-of-2003/ (September 15, 2014)https://freedom-to-tinker.com/blog/felten/the-linux-backdoor-attempt-of-2003/ © 2014 Keith A. Pray Nick Brown 12
CS 3043 Social Implications Of Computing ONLINE GAME IDENTITY Online game companies – Are they improving to keep our personal information secure? – Information users commonly give Contact information Account information Billing information © 2014 Keith A. Pray13 Adam Myers Picture: http://www.playstation.com/en-us/legal/user-agreements
CS 3043 Social Implications Of Computing PLAYSTATION NETWORK OUTAGE ~77 million accounts stolen – Prevented use of online service  – Personal identifiable information stolen from each account  – New Terms and Conditions  © 2014 Keith A. Pray14 Adam Myers Picture: http://cdn0.vox-cdn.com/uploads/chorus_image/image/37383186/playstation_network_logo.0_cinema_960.0.jpg
CS 3043 Social Implications Of Computing SECURITY MEASURES COMPANIES ARE TAKING Two factor authentication  – Authenticators  – Steam Guard  – Optional © 2014 Keith A. Pray15 Adam Myers Picture: http://www.pcweenie.com/reviews/games/wow4p/_graphics/p10_001_BlizzardAuthenticator.jpg
CS 3043 Social Implications Of Computing PLAYERS WANT THEIR PRIVACY Blizzard Real ID  – Online friends can see users real name – Initially planned to allow all forum user to see each others Real ID – Massive outcry; 3 days later, Real ID became optional  Companies’ information security methods have improved, and will continue to improve © 2014 Keith A. Pray16 Adam Myers Picture: http://media.pcgamer.com/files/2010/07/Real-Id.png
CS 3043 Social Implications Of Computing REFERENCES  Richmond, Shane (2011-04-26). "Millions of internet users hit by massive Sony PlayStation data theft". London: Telegraph. 2011-04-29.  Kazuo Hirai's Letter to the U.S. House of Representatives". a photo set by Flickr user PlayStation.Blog. Flickr. https://www.flickr.com/photos/playstationblog/sets/72157626521862165/. 2011-10-20  "New Sony Terms of Service Ban Class Action Lawsuits, Is that Legal?". http://gdn9.com/story-25130- New-Sony-Terms-of-Service-Ban-Class-Action-Lawsuits-Is-that-Legal.html. 15 September 2011  https://www.soe.com/soeauthenticator/faq/#19 September 15 2014  https://support.steampowered.com/kb_article.php?ref=4020-ALZM-5519 September 15 2014.  Rob Pegoraro http://voices.washingtonpost.com/fasterforward/2010/07/world_of_warcraft_real_names.html. September 16 2014  Brendan Sinclair http://www.cnet.com/news/blizzard-real-id-system-sparks-controversy/. September 16 2014 © 2014 Keith A. Pray17 Adam Myers
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net CLASS 6 THE END © 2014 Keith A. Pray
7 Effective Habits when using the Internet Philip O’Kane 1.
The Privacy Tug of War: Advertisers vs. Consumers Presented by Group F.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
INTERNET PRIVACY Marketing companies The cookie leak security hole in the HTML messages The Web Bug Can we trust the privacy.
Jared Cinque Section 6. Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright © B. C. Neuman, - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Fall Security Systems Lecture notes Drs.
Kyleigh LESLIE. I will never give out my personal information like my phone number, location, and my school.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites Web sites can collect a lot of information about your visit.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Computer Ethics. 2 Case Study #1 Verizon and the RIAA: Jan. 2003: The RIAA won a lawsuit against Verizon which forced Verizon to hand over information.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
1 Netprog Course Information Network Programming Instructor: Dave Hollinger Home Page:
Wireless and Mobile Security Lesson Introduction ●WiFi security ●iOS security ●Android security.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Staying Safe Online Keep your Information Secure.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Overview In this tutorial you will: identify different ways to access review your own skills identify rules to follow when using . There.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Presentation By Deepak Katta Android Privacy. Outline Introduction Android Vs IoS Privacy Issues Spyware for Android Samples of Spyware for Android Attack.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future People shouldn’t.
Staying Safe, Having Fun, And Cruising The ‘Net Daniel Owens IT Security Professional.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
A First Course in Information Security Nancy Smithfield Computer Science and IT Department Austin Peay State University
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
ONE® Pages Training Presentation North York General Hospital.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Georgios Kontaxis‡, Michalis Polychronakis‡, Angelos D. Keromytis‡, and Evangelos P.Markatos* ‡Columbia University and *FORTH-ICS USENIX-SEC (August, 2012)
How It Applies In A Virtual World. Introduction Got cookies? Internet explorer What is internet Privacy? How secure your computer, files, and information.
ADMINISTRATION Sources of Information REVISION – BLOCK 6.
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net CLASS 6 PRIVACY © 2015 Keith A. Pray.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
Dextrosoft SCHEDULED PHONE BACKUP Backup your mobile life Version Copyright © 2015 Dextrosoft Private Limited. All Rights Reserved.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
© 2017 SlidePlayer.com Inc. All rights reserved.