Presentation is loading. Please wait.

Presentation is loading. Please wait.

CPS 82, Fall 2008 17.1 Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.

Similar presentations


Presentation on theme: "CPS 82, Fall 2008 17.1 Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification."— Presentation transcript:

1 CPS 82, Fall 2008 17.1 Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification  Insecurity  Secondary Use  Exclusion

2 CPS 82, Fall 2008 17.2 Solove’s Taxonomy l Aggregation  Government  Consumer business  Credit business l Data mining yields “unsettling facts” l Digital dossier  Is it you? l Sex offender laws l Bad data issues l Identification  SSN  National ID card l Need for ID  Bank accounts  Licensing .. l Link data to specific individuals l Anonymity

3 CPS 82, Fall 2008 17.3 Taxonomy continued l Insecurity  Identity theft  Distortion (false facts) l Govt, Industry must maintain privacy  Data storage  Data access l Secondary Use  Using data for purpose other than original intent  Fingerprints for govt employees l Who owns information?  Company  Individual

4 CPS 82, Fall 2008 17.4 Taxonomy Finished l Exclusion  How is data modified and fixed?  Access to credit report l People should be told about data l How is data shared l Info. Dissemination  Kiss and tell  Medical  Breach of trust l Notification on release of record?  Expectation

5 CPS 82, Fall 2008 17.5 From Privacy to Cryptography l How do we keep digital information private?  Keep it to ourselves  Don’t go online  Use cryptography to protect it l When should we really insist on security?  Facebook?  Bank?  Other?

6 CPS 82, Fall 2008 17.6 Cryptography l For encryption to work  Not to hard to encrypt (time, money)  Easy to decrypt if allowed (time, money)  Impossible to decrypt if not allowed (??) l Mathematics is the basis for cryptography  Very hard to factor numbers  Very easy to determine if a number is prime  No “security through obscurity” publish methods

7 CPS 82, Fall 2008 17.7 PKI: Public Key Infrastructure l From PGP to Hushmail  PGP is “pretty good privacy”, Phil Zimmerman  http://www.philzimmermann.com/EN/contact/index.html http://www.philzimmermann.com/EN/contact/index.html  http://www.philzimmermann.com/EN/audiovideo/index.html http://www.philzimmermann.com/EN/audiovideo/index.html  Originally distributed in book form because of “munitions export restrictions” (1990’s, 40 bit)  Web of trust for public key/private key l How do circumvent these systems?  Keylogging software by federal agents

8 CPS 82, Fall 2008 17.8 Cryptography for the masses l http://www.youtube.com/watch?v=ZDnShu5V99s http://www.youtube.com/watch?v=ZDnShu5V99s l http://www.youtube.com/watch?v=XeaZGt8_j1k http://www.youtube.com/watch?v=XeaZGt8_j1k l http://video.aol.com/video-detail/rsa-encryption- and-decryption-diginfo/1505435307 http://video.aol.com/video-detail/rsa-encryption- and-decryption-diginfo/1505435307 l http://www.catonmat.net/blog/musical-geek-friday- crypto/ http://www.catonmat.net/blog/musical-geek-friday- crypto/


Download ppt "CPS 82, Fall 2008 17.1 Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification."

Similar presentations


Ads by Google