Download presentation
Presentation is loading. Please wait.
Published byBryce Webb Modified over 10 years ago
1
Privacy, Security, and Copyright in the Digital Era By Ben Shaw, Mike Vaneman, and Mike Kozak
2
Digital Era New tool set Digital data Fingerprint scan Fingerprint scan 0110100011110101100111001110001 0110100011110101100111001110001 Digital equipment Software Software Hardware Hardware Advances in digital technology
3
Privacy Define privacy Self-value Is our privacy at stake? Privacy in the Digital Era
4
Digital Technologies Biometrics Identification Identification Authentication Authentication Location tracking “Always -On” “Always -On” New advancements New advancements Electronic communications Internet Internet
5
Biometrics What are biometrics? Different types of biometric systems Iris Iris Fingerprint Fingerprint Voice Voice Facial Facial
6
Biometric Identification Super Bowl XXXV People are identified based on facial characteristics Samples are compared to biometric data stored in large database, referred to as “one-to-many” Employed by police and government officials
7
Biometric Authentication Individual verification technique used by government agencies Individual’s biometric data is stored on a smart card FacePASS Privacy issues
8
Location Tracking Advancements in cell phone technology Cell phone tracking “Always-On” On-demand tracking On-demand tracking Provide emergency locations Provide emergency locations New advancements RFID RFID Implanted radio chips Implanted radio chips License plate cameras License plate cameras Privacy Issues
9
Electronic Communications Internet Advancements in information and communication technologies have significantly raised the acceptance rate of Internet-based applications and services Advancements in information and communication technologies have significantly raised the acceptance rate of Internet-based applications and services Multiple privacy threats on the WWW Multiple privacy threats on the WWWAnonymity Anonymizer Anonymizer
10
Privacy Threats on The Web Cookies Those darn things Those darn thingsBrowsers Security flaws Security flawsEmail W@X.Y.Z W@X.Y.ZSpam Pain in the you no what Pain in the you no what Search engines Google Google
11
Google Google’s immortal cookie Google records everything they can Google retains all data indefinitely Google won’t say why they need this data Google hires ex-NSA Google’s toolbar is spyware Google’s cache copy is illegal Google is not your friend Google is a privacy time bomb
12
Anonymity Anonymizer Web anonymity tool Web anonymity tool Acts as a link between user and the website he or she is trying to access Acts as a link between user and the website he or she is trying to access Third party Third party
13
Digital Security
14
Security Types Internet Security Network Security Computer Security
15
Router Usage A router acts as a junction between two or more networks to transfer data packets among them Greatly reduces risk of being hacked when using Network Address Translation (NAT) NAT is the re-writing of the source and/or destination addresses of IP packets as they pass through a router or firewall NAT is the re-writing of the source and/or destination addresses of IP packets as they pass through a router or firewall Allows for multiple hosts on a private network to access the internet through the use of a single public IP address Allows for multiple hosts on a private network to access the internet through the use of a single public IP address
16
Router Usage NAT also typically has the effect of preventing connections from being established inbound into your computer, whilst permitting connections out NAT also typically has the effect of preventing connections from being established inbound into your computer, whilst permitting connections out
17
Firewall Blocks traffic to all unauthenticated ports on your computer, thus restricting access
18
Firewall Usage Firewalls use one or more of three methods to control traffic flowing in and out of the network: Packet filtering - Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded. Packet filtering - Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded. Proxy service - Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. Proxy service - Information from the Internet is retrieved by the firewall and then sent to the requesting system and vice versa. Stateful inspection - A newer method that doesn't examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics. If the comparison yields a reasonable match, the information is allowed through. Otherwise it is discarded. Stateful inspection - A newer method that doesn't examine the contents of each packet but instead compares certain key parts of the packet to a database of trusted information. Information traveling from inside the firewall to the outside is monitored for specific defining characteristics, then incoming information is compared to these characteristics. If the comparison yields a reasonable match, the information is allowed through. Otherwise it is discarded.
19
Software Security Risks Viruses A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program or email. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program or email. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.Worms A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. computer networks computer networks
20
Software Security Risks Spyware Spyware is a category of computer programs that attach themselves to your operating system in nefarious ways. They can suck the life out of your computer's processing power. They are designed to track your Internet habits, nag you with unwanted sales offers or generate traffic for their host Web site. According to recent estimates, more than two-thirds of all personal computers are infected with some kind of spyware Spyware is a category of computer programs that attach themselves to your operating system in nefarious ways. They can suck the life out of your computer's processing power. They are designed to track your Internet habits, nag you with unwanted sales offers or generate traffic for their host Web site. According to recent estimates, more than two-thirds of all personal computers are infected with some kind of spyware Trojan Horses A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.Adware Adware is software integrated into or bundled with a program. It is usually seen by the programmer as a way to recover programming development costs, and in some cases it may allow the program to be provided to the user free of charge or at a reduced price. The advertising income may allow or motivate the programmer to continue to write, maintain and upgrade the software product. Adware is software integrated into or bundled with a program. It is usually seen by the programmer as a way to recover programming development costs, and in some cases it may allow the program to be provided to the user free of charge or at a reduced price. The advertising income may allow or motivate the programmer to continue to write, maintain and upgrade the software product.
21
Virus Statistics Past 7 days # Virus Name Infected Computers Scanned Computers % Infected 1 Exploit-WMF 43,451955,4814.55 2 JS/Wonka 40,810955,4814.27 3 Exploit-ByteVerify 34,966955,4813.66 4 Exploit-ANIfile 31,114955,4813.26 5 Adware-Url.gen 29,956955,4813.14 6 Downloader-ZQ 27,797955,4812.91 7 Generic Downloader.z Generic Downloader.z 27,545955,4812.88 8 Adware-Boarim 20,991955,4812.2 9 Adware-Cometsys 17,779955,4811.86 10 JV/Shinwow 15,491955,4811.62
22
Spyware Example Many Internet Explorer add-on toolbars monitor the user's activity. When installed and run without the user's consent, such add-ons count as spyware. Here multiple toolbars (including both spyware and innocuous ones) overwhelm an Internet Explorer session.
23
Phishing Security Risk Phishing is a form of criminal activity using social engineering techniques. It is characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication. It is typically done through email and the end result if successful is identity fraud
24
Phishing Facts 13,776 phishing attacks linked to 5,259 Web sites took place in August of 2005. They targeted 84 different businesses, but three businesses received 80 percent of the attacks. 85 percent of the attacks targeted banks and other financial institutions.
25
Phishing Trend A chart showing the increase in phishing reports from October 2004 to June 2005.
26
Copyright
27
Copyright and Copyright Infringement Copyright Laws Laws Digital Rights Management Digital Rights Management MPAA and RIAA MPAA and RIAA Copyright Infringement BitTorrent BitTorrent Contributions Contributions
28
Copyright “Copyright is a set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. At its most general, it is literally "the right to copy" an original creation. In most cases, these rights are of limited duration (http://en.wikipedia.org/wiki/Copyright)
29
Copyright Laws Copyright Act of 1790 "sole right and liberty of printing, reprinting, publishing and vending" "sole right and liberty of printing, reprinting, publishing and vending" maps, charts, and books maps, charts, and books 14 year term 14 year term
30
Copyright Laws Copyright Act of 1976 Copyright of expression literary, dramatic, and musical works; pantomimes and choreography; pictorial, graphic and sculptural works; audio-visual works; sound recordings; and architectural works literary, dramatic, and musical works; pantomimes and choreography; pictorial, graphic and sculptural works; audio-visual works; sound recordings; and architectural works eligible for copyright protection as soon as it is fixed in a tangible form eligible for copyright protection as soon as it is fixed in a tangible form
31
Copyright Laws Established the fair use policy for copyright holders Defines conditions under which individuals may use copyrighted material without permission Defines conditions under which individuals may use copyrighted material without permission Possible to quote from a copyrighted work Possible to quote from a copyrighted work Fair use is a "defense" to copyright infringement, not a right. Fair use is a "defense" to copyright infringement, not a right.
32
Copyright Laws Digital Millennium Copyright Act, DMCA The act criminalizes production and dissemination of technology that can circumvent measures taken to protect copyright The act criminalizes production and dissemination of technology that can circumvent measures taken to protect copyright heightens the penalties for copyright infringement on the Internet heightens the penalties for copyright infringement on the Internet Limited the liability of Online Providers Limited the liability of Online Providers
33
MPAA Motion Picture Association of America protect member interests through political lobbying for changes in copyright and criminal law protect member interests through political lobbying for changes in copyright and criminal law Responsible for the film rating system Responsible for the film rating system Setting DMCA regulations Setting DMCA regulations
34
RIAA Recording Industry Association of America Responsible for setting technical recording standards Responsible for setting technical recording standards Collection of music licenses and royalties Collection of music licenses and royalties Setting DMCA regulations Setting DMCA regulations
35
Digital Rights Management To date all DRM methods have failed Physical protection Physical protection DIVX DIVX CSS CSS Product activation Product activation Digital watermarking Digital watermarking
36
Copyright Infringement “Copyright infringement is the unauthorized use of copyrighted material in a manner that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works that build upon it. (http://en.wikipedia.org/wiki/Copyright_infri ngement)
37
Copyright Infringement BitTorrent Azureus, BitComet, BitLord, uTorrent Azureus, BitComet, BitLord, uTorrent EDonkey, FastTrack and Gnutella EDonkey 2000 EDonkey 2000 KaZaA, Grokster KaZaA, Grokster Bearshare, Gnucleus, LimeWire, Morpheus, Phex, Shareaza Bearshare, Gnucleus, LimeWire, Morpheus, Phex, Shareaza
38
BitTorrent.torrent files Trackers TrackersSeeders Completed file Completed fileLeachers Downloaders Downloaders
39
BitTorrent Protocol breaks the file(s) down into smaller fragments Requests from peers the fragments that are most rare Uploading fragments to their peers before the entire file is downloaded Chooses the peer with the best network connections for the fragments that it is requesting
40
BitTorrent
41
uTorrent
42
Advancements MPAA and RIAA followed in the footsteps of file sharing software Napster, ITunes Napster, ITunes Warner Brothers Warner Brothers Network Television Stations Network Television Stations
43
This Concludes Our Presentation Any Questions?
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.