Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference.

Slides:



Advertisements
Similar presentations
Presentation to WTO/CTD Seminar on e-commerce Richard Bourassa Director, International Policy Director, International Policy Electronic Commerce Branch.
Advertisements

Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Internet Infrastructure and Emerging Technologies Term project Internet Infrastructure and Emerging Technologies Term project.
Whitmore/Stevenson: Strategies for Engineering Communication 1 of 8 Collaborative Inventing Strategies  Discussion  Brainstorming  Research.
The Internet & The New IT Infrastructure Chapter 9.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Chapter 10: Electronic Commerce Security. Electronic Commerce, Seventh Annual Edition2 Impact of Security on E-Commerce In 2006 an estimated $913 million.
CS155a: E-Commerce Lecture 2: Sept. 11, 2001 Course Overview.
Electronic and Computer Engineering D Azzi (PL)R Khusainov (SL) D Robinson (RF-HEIF IV)
E-Commerce: Regulatory, Ethical, and Social Environments
CAP6135: Malware and Software Vulnerability Analysis Examples of Term Projects Cliff Zou Spring 2012.
Computer Science Public Key Management Lecture 5.
Practice and Experience in the Application of Cryptography Bao Feng Cryptography and Security Department.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Information Systems and Internet Security (ISIS) Lab Research overview and some recent projects Nasir Memon Polytechnic Institute of NYU.
1 Accessing the Global Database The World Wide Web.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
CS300 Computers in Society Web- based course Rekha Gupta.
NYIT TUES Evaluation May 2014 Dr. Sarah McPherson Evaluator NYIT School of Education.
Lukas Ruf, TIK April 6th WP3 Presentation, ETH WP 3 -- Security Technology And Multimedia Delivery Computer Engineering and Networks Laboratory,
©2013 Cengage Learning. All Rights Reserved. Business Management, 13e Technology and Information Management Electronic Technology Fundamentals.
Lecture 31 Electronic Business (MGT-485). Review of Lecture
@Yuan Xue CS 285 Network Security Fall 2008.
Security in Wireless Sensor Networks using Cryptographic Techniques By, Delson T R, Assistant Professor, DEC, RSET 123rd August 2014Department seminar.
E-Commerce Course Overview. Telephone Network Connection-based Admission control Intelligence is “in the network” Traffic carried by relatively few, “well-known”,
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Dr. Nazar Abbas Saqib.
Introduction University of Sunderland CSEM02 Harry R Erwin, PhD Peter Dunne, PhD.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Module 9: Fundamentals of Securing Network Communication.
March 4, 2004 Cryptography and Computer Security for Undergraduates Suzanne E. Gladfelter Penn State York
Security challenges in Smart Lighting Paul Chilton NXP Semiconductors.
CALEA Communications Assistance for Law Enforcement Act Current Campus Perspective of Implementation Issues November 17, 2005 Doug Carlson – New York University.
Privacy, Confidentiality, and Security Unit 8: Professional Values and Medical Ethics Lecture 2 This material was developed by Oregon Health & Science.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
E-commerce 24/12/ Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing,
Chris Pannozzo September 20,2007 CSC 101 Asssignment 2 Web Resources.
Final Exam Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed Closed book No calculator Students should show.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
3.4 Internet Strand 3 Sara Liquori. 3.4 Internet  A global computer network providing a variety of information and communication facilities, consisting.
Secure & Asymmetric Approach for Designing FUTURE INTERNET Presented by Md. Obaidur Rahman Networking Lab, Department of Computer Engineering, Kyung Hee.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Privacy and Data Mining What Do “They” Know About You?
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Understand Internet Security LESSON Security Fundamentals.
Overview Present the past, present & future of VoIP. Focus: –Technology –Cultural Factors –Economic Factors –Regulatory Factors.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
Koji OKAMURA Cybersecurity Center, Kyushu University Cybersecurity Education.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
BYOD Technical workshop Simon Bright - E2BN Philip Pearce – E2BN.
Security of the Internet of Things: perspectives and challenges
TECHNOLOGY GUIDE THREE
Course Introduction and Student Success
Computer Science Courses
E-Commerce: Doing Business on the Internet
Privacy …refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Networks and the Internet
Privacy and Data Mining
Privacy and Data Mining
Computer Science Courses in the Major
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Steve Wicker Cornell University 1 TRUST Autumn 2011 Conference

 One of several “Intro to Engineering” courses ◦ College of Engineering freshmen must take one ◦ Designed to entice freshmen to affiliate with ECE, CS, or Information Science  Three Modules ◦ Info Networking Technology ◦ Security ◦ Privacy  Currently being taught for the second time. TRUST Autumn 2011 Conference2

 Journal and newspaper articles  Text (in development)  Guest lectures TRUST Autumn 2011 Conference3

 Information Networking Technology ◦ 3G and 4G Cellular  Voice/Data/Everything else Convergence  Centralized Architecture ◦ WiFi ◦ Internet  TCP/IP  End to End Design ◦ Voice over IP TRUST Autumn 2011 Conference4

 Information Security and Cryptology ◦ Symmetric and Asymmetric Key Cryptography  PKIs ◦ The Trusted Platform Module ◦ Zero-Knowledge Proofs and Anonymous Authentication ◦ National Crypto Policy TRUST Autumn 2011 Conference5

 Network Security ◦ Private Computing though Cryptography ◦ Key Distribution Schemes ◦ Remote Attestation in Distributed Systems TRUST Autumn 2011 Conference6

 Information Privacy ◦ Definitions of Privacy ◦ Why Should We Care? ◦ The Societal Impact of Privacy Invasion ◦ Privacy and Security on Social Networking Sites TRUST Autumn 2011 Conference7

 Privacy Law ◦ Technical and Legal History of the Wiretap ◦ Information Content vs. Context ◦ The Electronic Communication Privacy Act ◦ CALEA and VoIP TRUST Autumn 2011 Conference8

 Privacy-Aware Design Practices  Behavioral Economics and Technologies that “Nudge”  Student Project TRUST Autumn 2011 Conference9

 Students select a networked technology and explore how it might be used as a surveillance technology.  They apply privacy-aware design practices to re-design the system to make it more privacy-friendly.  Suggested technologies: ◦ cellular networks, smart meters for power consumption monitoring, and wireless Internet services. TRUST Autumn 2011 Conference10

 Privacy-Aware Design of Web Browsers and Websites  Taking Back Locational Privacy  Privacy-aware RFIDs TRUST Autumn 2011 Conference11