Information Law: Expression, Access, Privacy The right to inform The right to be informed The right to secrets.

Slides:



Advertisements
Similar presentations
Cryptography encryption authentication digital signatures
Advertisements

CIS 193A – Lesson6 CRYPTOGRAPHY RAPELCGRQ. CIS 193A – Lesson6 Focus Question Which cryptographic methods help computer users maintain confidentiality,
Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
1.3 Control of Information In this section you must be able to: Describe the legal rights and obligations on holders of personal data to permit access.
Principles of Information Security, 2nd edition1 Cryptography.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
CS 105 – Introduction to the World Wide Web  HTTP Request*  Domain Name Translation  Routing  HTTP Response*  Privacy and Cryptography  Adapted.
Classic Cryptography: Caesar Wenyuan Xu Department of Computer Science and Engineering University of South Carolina 2008.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Introduction to Public Key Infrastructure (PKI) Office of Information Security The University of Texas at Brownsville & Texas Southmost College.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Do you know how to keep yourself safe?
Encryption Methods By: Michael A. Scott
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Crypto Party ATX Shameless self-promotion Visit us at Step-by-step guides on how to encrypt your s,
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Section 3.6: An Introduction to Cryptography
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Enhancing Security with S/MIME Chuck Connell,
3.1 SERVICES AND MECHANISMS SERVICES AND MECHANISMS The International Telecommunication Union- Telecommunication Standardization Section (ITU-T) provides.
MAT 1000 Mathematics in Today's World Winter 2015.
Linux Networking and Security Chapter 8 Making Data Secure.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange.
Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Section 2.1: Shift Ciphers and Modular Arithmetic Practice HW from Barr Textbook (not to hand in) p.66 # 1, 2, 3-6, 9-12, 13, 15.
Bit Cipher 1. Example of bit Cipher 2 Practical Stream Cipher 3.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Section 4.4: The RSA Cryptosystem Practice HW Handwritten and Maple Exercises p at end of class notes.
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
Internet Safety KNOW HOW TO STAY SAFE ONLINE. You should never give out certain information over the internet.  Examples include:  Your last name 
Encryption / Security Victor Norman IS333 / CS332 Spring 2014.
CSCI 391: Practical Cryptology Substitution Monoalphabetic Ciphers.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Cryptology aka Cryptography Tim Cahill Ryan Church.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
1 Cryptography Troy Latchman Byungchil Kim. 2 Fundamentals We know that the medium we use to transmit data is insecure, e.g. can be sniffed. We know that.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Encryption.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Lesson 4-5 AP Computer Science Principles
Lesson 5: Simple Encryption
Cryptography and Network Security
Outline Using cryptography in networks IPSec SSL and TLS.
Lesson 7: Simple Encryption
Computer Security Chapter Two
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Information Law: Expression, Access, Privacy The right to inform The right to be informed The right to secrets

Copyright Printing press Printing press Player pianos Player pianos Radio Radio VCRs VCRs Digital content and the internet Digital content and the internet How does technology enhance expression? How does technology enhance expression? How should the law protect that expression? How should the law protect that expression? – Which expression is most valuable to society?

Privacy Intrusion upon someone’s seclusion or solitude (butting into personal stuff) Intrusion upon someone’s seclusion or solitude (butting into personal stuff) Public disclosure of embarrassing private facts about someone (telling secrets) Public disclosure of embarrassing private facts about someone (telling secrets) Publicity that puts someone in a false light in the public eye (claiming you have a certain negative viewpoint that you do not have) Publicity that puts someone in a false light in the public eye (claiming you have a certain negative viewpoint that you do not have) Using someone’s name or likeness for an advantage (using your picture in an ad without permission) Using someone’s name or likeness for an advantage (using your picture in an ad without permission)

The Right to be Informed Does the public have a right to all truthful information? – What kind of true information should NOT be shared? – Should we ever get rid of irrelevant information? – What about news? What counts as a news source today?

My Research! Is the right to expression a right to permanent expression? Once the information is out there, should someone harmed by the information be able to delete it? – Is this rewriting history? – What do we know about destroying parts of history we do not like to remember? Can we ever really delete information once it’s out there?

Making Information Inaccessible Steganography – hiding the existence of a message Steganography – hiding the existence of a message Cryptography – hiding the meaning of the message Cryptography – hiding the meaning of the message – Cipher – system for hiding the meaning of a message by replacing each letter in the original message with another letter. Plaintext: My dog is a mut. Plaintext: My dog is a mut. Ciphertext: Nz eph jt b nvu. Ciphertext: Nz eph jt b nvu.

How can we keep a secret? If you let the cipher alphabet be any rearrangement of the 26 letters, there are over 400,000,000,000,000,000,000,000,000 KEYS – Key = details for decrypting (the exact cipher alphabet to break the code) – Algorithm = encrypting method (how the plaintext was changed)

Sending Keys Across the Internet Trust – assume you do not really trust the path your message is traveling along and it could be intercepted, but your friend needs to get the message How can you send an encrypted message without sending the key? – We need candy…

Can you break the code? 1.Orxlvylooh orvw wr Pruhkhdg Vwdwh! 2.J xp x pxb. (not really, it’s just easier) 3.Wesh rp qes usff akrha qk orha? – Hint keyword: Julius Caesar 4.How could someone who is not the recipient get the candy? What can we do to protect the message?