For Information Privacy Lindsay Taylor Western University

Slides:



Advertisements
Similar presentations
What is GNU/Linux (Not Linux!)? David Sudjiman davidsudjiman (at) yahoo (dot) com The latest version of this document can.
Advertisements

OPEN DATA RECOMMENDATIONS: LICENSING IATI Licensing Working Group.
Open Source Applications Mikko Mustalampi DAP02S.
Open Source Software …its not all for the techies. - Dan Coming.
How Is Open Source Affecting Software Development? Je-Loon Yang.
CHAPTER 6 OPEN SOURCE SOFTWARE AND FREE SOFTWARE
Open Source for Government Alexander C. Pitzner Sr. Network Engineer Harrisburg University of Science and Technology
Is Open Source Software a viable option for private and public organizations? Anthony W. Hamann Tuesday, March 21, 2006.
Are You Ready for an Open Source LMS? Is It Ready for You? Steven Hancock.
PREPARED BY: YOUR FIRST AND LAST NAME CURRENT DATE Ethics for Computer Use.
Information Security 101 Five things you should learn to protect your data and privacy February 26/27, 2014.
Open Source Ethics Muhammad Sarmad Ali. What is Open Source? Doesn’t just mean access to source code.
DIGITAL SECURITY Information Security and data protection Facilitator: Yvonne Oluoch.
CPS 82, Fall Open Source, Copyright, Copyleft.
CS 501: Software Engineering Fall 1999 Lecture 19 Management II Business and legal aspects of software engineering.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
A Presentation on Open Source by Aidan McGuire Director
1 CS 501 Spring 2003 CS 501: Software Engineering Lecture 7 Business Aspects of Software Engineering.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
1 Open Source Update Jerry Thode Founder and President J. Paul Group, LLC February 8, 2005.
Open Source Software This permits users to use, change, and improve the software, and to redistribute it in modified or unmodified forms. It is very often.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Panda Anti-Rootkit & password storage tools
Distribution Development Security Jeremiah Yongue.
WEBSITES AND ADDRESS RELATIONSHIP By: Nahed Alnahash Dr. Wenjin Zhou.
iSpring Free 1.Free Redistribution 2.Source Code 3.Derived Works 4.Integrity of The Author's Source Code 5.No Discrimination Against Persons or Groups.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Welcome Topic : Security.
Copyright, Don G. Gotterbarn, 2002 Professional Issues in the “Open Source Movement” D on Gotterbarn East Tennessee State University Copyright, Don G.
Open Source Programming and OpenOffice.org Jeff Koehler ITEC V1FF April 5, 2007.
Visualization of Aeronautical Information Presentation to AIXM Users’ Conference, Federal Aviation Administration, Washington D.C., Feb 27-March 1, 2007.
Chapter 3: Understanding Software Licensing
Open Source Software in Federal Acquisitons Acquiring Maximum Agility: Beyond Open Standards TCO and Best Value Revisited.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
- Richard Bhuleskar “At the end of the day, the goals are simple: safety and security” – Jodi Rell.
The New NAP Members’ Area Development. Elgg What is elgg? –Elgg is an award-winning open source social networking platform.
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
The Design and Implementation of Free Templates for Digital Achieving Speaker : Kuang-Yu Wu 1.
โอเพนซอร์สและการคิดแบบ โอเพนซอร์ส ธวัชชัย เอี่ยมไพโรจน์
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
One Laptop Per Child The Mesh Network Αθανασιάδης Π.Γιάννης
Security Issues in Information Technology
Key management issues in PGP
Open Source Software Practices
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Digital Signature By: Jermel Lee.
COMPUTER SECURITY CONCEPTS
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Information Security message M one-way hash fingerprint f = H(M)
Step up your cyber defence
Trevor Taylor, Director, Member Services, Asia and the Americas,
OPEN SOURCE BY :.
CS 465 Secure Last Updated: Nov 30, 2017.
OPEN SOURCE SOFTWARE An Introduction.
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
Information Security message M one-way hash fingerprint f = H(M)
The Hash Function Dr. Ron Eaglin.
Creative Commons Canada
Information Security message M one-way hash fingerprint f = H(M)
CSE 484 Midterm Review “1st half of the quarter in 5 slides”
Open Source Share, and be rewarded tenfold ….
Open Standards Policy in Belgium
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Unit 8 Network Security.
Electronic Payment Security Technologies
Outline A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001 Sensor.
Definition Of Computer Security
Session 1 – Introduction to Information Security
Presentation transcript:

For Information Privacy Lindsay Taylor Western University An Open Source Toolbox For Information Privacy Lindsay Taylor Western University

What is Open Source? Free Redistribution Source Code Derived Works Integrity of the Author’s Source Code No Discrimination Against Persons or Groups No Discrimination Against Fields of Endeavor Distribution of License License Must Not Be Specific To A Product License Must Not Restrict Other Software License Must Be Technology Neutral Open Source Definition from Open Source Initiative

Open Source + Privacy What are the protections open source offers? What are the risks? Open source cryptography More contributions = Better security ↓For-profit data collection Signatures for Authenticity eg. GnuPG

Why Is this important?

Tor Browser

KEEPass Strong Passwords Long Random Frequently updated

Tutanota Bob’s Public Key Bob’s Private Key

More Open SourcE TOOls

Thank You! https://opensource.org/ https://www.schneier.com/cryptogram/archives/1999/0915.html#OpenSourceandSec urity https://ssd.eff.org/en https://developer.mozilla.org/en- US/docs/Archive/Security/Encryption_and_Decryption https://www.torproject.org/about/overview.html.en https://tb-manual.torproject.org/en-US/ http://keepass.info/help/base/firststeps.html https://tutanota.com/howto https://libraryfreedomproject.org/resources/privacytoolkit/