Capstone Jeopardy Chapter 5 Secret Bits Chapter 6 Balance Toppled Chapter 7 You Can’t Say That on the Internet Chapter 8 Bits in the Air Chapter 4 Needles.

Slides:



Advertisements
Similar presentations
Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Intellectual Property Image: William J. Wynn.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Capstone Jeopardy Internet Appendix Chapter 1 Digital Explosion Chapter 2 Naked in the Sunlight Chapter 3 Ghosts in the Machine Chapter 4 Needles in the.
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Big Brother Might be Watching. Agenda: US Patriot Act Copyright Infringement Social Media Packets.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
1.3 Control of Information In this section you must be able to: Describe the legal rights and obligations on holders of personal data to permit access.
Principles of Information Security, 2nd edition1 Cryptography.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
CC3.12 Erdal KOSE Privacy & Digital Security Encryption.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Forced Internet Filtering Thomas Mahoney. Internet Filtering ► Techniques  Technical blocking  Search result removal  Take-Down  Self-Censorship ►
CS1001 Lecture 24. Overview Encryption Encryption Artificial Intelligence Artificial Intelligence Homework 4 Homework 4.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Presentation Layer Network Format Local Format Information Transformation “few standards, but a lot of ideas”
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
C opyright Protection and Digital Rights Management 1.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
1 Introduction to Codes, Ciphers, and Cryptography Michael A. Karls Ball State University.
Cryptography Week-6.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
 Describe ethics  List key principles you believe › How do these principles effect your ethics?  Is it sometimes ok to “break” the rules? › Whistle.
Chapter 2 Basic Encryption and Decryption. csci5233 computer security & integrity 2 Encryption / Decryption encrypted transmission AB plaintext ciphertext.
Encryption Encryption encodes information to hide it from everyone else … maintaining your privacy.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
1 Intellectual Property “Gift of Fire”. 2 Intellectual Property - Have you ever give a CD to a friend that contained a copy of a computer game or a programs?
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
BitTorrent How it applies to networking. What is BitTorrent P2P file sharing protocol Allows users to distribute large amounts of data without placing.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Copyright Protection Allowing for Fair Use Team 9 David Dobbs William Greenwell Jennifer Kahng Virginia Volk.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Intellectual Property in Peer-to-Peer Networks Artsiom Yautsiukhin Natallia Kokash Intellectual Property Law, 18 October 2005.
The Bits Bazaar Vast amounts of information scattered across the world. Access within reach of millions of people without editors. Search engines provide.
Jeopardy CH4CH5CH6CH7 CH8 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
Expression on the Net Is it possible to control what is seen and by whom on the network? Like a book? Newpapers? Phone call? Television? Where to regulate:
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Principles of AAVTC Ethics & Copyright Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used with permission.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Laws and Rules That Govern Internet Safety Ashley Martin.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Digital Rights Management Zach Milko. Overview Definition Why it exists DRM Today  Fairplay Opponents of DRM  DefectiveByDesign.org Future Conclusion.
INCS 741: Cryptography Overview and Basic Concepts.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
DIGITAL FOOTPRINTS 11 TIPS FOR MONITORING YOUR DIGITAL FOOTPRINT AND 5 TIPS TO MAKE IT POSITIVE.
Jeopardy CH4CH5CH6CH7 CH8 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
A Gift of Fire Third edition Sara Baase
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
The Internet: Encryption & Public Keys
The Bits Bazaar Vast amounts of information scattered across the world. Access within reach of millions of people without editors. Search engines provide.
Chapter Goals Define cryptography
Presentation transcript:

Capstone Jeopardy Chapter 5 Secret Bits Chapter 6 Balance Toppled Chapter 7 You Can’t Say That on the Internet Chapter 8 Bits in the Air Chapter 4 Needles in the Haystack

Secret Bits for 10 The Caesar cipher is a simple encryption scheme that is broken by determining what?

Secret Bits for 10 Answer: Knowing the alphabet and determining The shift amount

Secret Bits for 20 points A substitution cipher is fairly easy to break using what technique(s)?

Secret Bits for 20 Answer: Substitution ciphers are broken by using: Frequency analysis of symbols Determining repeated symbols One letter words, etc

Secret Bits for 30 points The one-time pad technique CANNOT be broken by cryptanalysis. Why don’t we use it for secure computer communication?

Secret Bits for 30 points Answer: Distributing the one-time pad between Alice and Bob secretly is as hard as distributing the message since: One-time pad can only be used once, and Must be as “long” as the message

Secret Bits for 40 points In the RSA algorithm both Alice and Bob have a Public key and a private key (Alice: A and a; Bob: B and b). Describe the steps needed for Alice to encrypt a message and Bob to decrypt the message.

Secret Bits for 40 Answer: 1)Alice gets Bob’s Public key B (from a directory or requests it) 2)Encrypts the message using the RSA algorithm with B as the key 3)Alice sends and Bob receives the encrypted message 4)Bob decrypts the message back to plaintext by using the RSA algorithm with b as the key

Secret Bits for 50 points When Alice sends Bob an encrypted message via , what part(s) of the IP packet are still in plaintext?

Secret Bits for 50 Answer: Everything, but the “data” of the IP packet is still in plaintext, so all the following information “leaks”: Sender’s IP address Receiver’s IP address Type of Service, etc

Balanced Toppled for 10 points Who is the RIAA and why did they sue 26,000 individuals for millions of dollars?

Balanced Toppled for 10 points Answer Recording Industry Association of America (RIAA) sued $750 for each illegal song download.

Balanced Toppled for 20 points What are the two kinds of secondary copyright infringement?

Balanced Toppled for 30 points What was Grokster’s defense in its lawsuit by RIAA?

Balanced Toppled for 30 points Answer: It’s decentralized file-sharing system had other uses besides music-sharing so the Sony v. Universal Studio (MPAA) “safe Harbor” ruling should apply.

Balanced Toppled for 40 points How does a Digital Rights Management (DRM) system of an electronic textbook assert control beyond the bounds of the paper textbook copyright law?

Balanced Toppled for 40 points Answers It might expire, limit the number of times read, block loaning or giving it to a friend, “phone home” (the publisher) to track your usage

Balanced Toppled for 50 points What is a music watermarking and what year did the “major music labels” stop using them?

Balanced Toppled for 50 points Answer Watermark – information embedded in the music that identified the original buyer so they could be held accountable for sharing. In 2008, but Apple iTunes and Univeral M Music Group in 2007

You Can't Say That for 10 points Was the Deleting Online Predators Act (DOPA) ever passed into law?

You Can't Say That for 10 points Answer No

You Can't Say That for 20 points Why was Cubby’s (start-up Shuttlebut service) lawsuit against CompuServe (Rumorville) denied?

You Can't Say That for 20 points Answer CompuServe was judged to be more like a distributor since they did not edit Rumorville’s defamatory statements against Cubby’s Skuttlegut service

You Can't Say That for 30 points Why was Stratton Oakmont’s lawsuit against Prodigy successful?

You Can't Say That for 30 points Answer Prodigy was ruled to be more like a publisher than a distributor since it claimed to edit content to be family-friendly.

You Can't Say That for 40 points Why was the CDA (Comm. Decency Act of 1996) past into law, and why was its “display provisions” (making offensive images to under 18-year olds a crime) struck down?

You Can't Say That for 40 points Answer The tradition Miller Test applied to “obscene” material, but what does “offensive” mean???

You Can't Say That for 50 points Why can’t the Internet be more like a Magazine store with respect to material harmful to minors?

You Can't Say That for 50 points Answer The first amendment and hard to verify age on the Internet

Bits in the Air for 10 points What’s the rationale for the Radio Act of 1927’s nationalization of the frequency spectrum?

Bits in the Air for 20 points How is channel capacity effected by the bandwidth and signal power?

Bits in the Air for 20 points Answer Channel capacity grows linear with bandwidth, but only logarithmically with power (need to double the power to send one more bit at a time).

Bits in the Air for 30 points What is meant by the “silo” organization of the legal structure?

Bits in the Air for 30 points Answer Not the layer approach like in the Internet, But radio from top-layer to bottom, etc.

Bits in the Air for 40 points What President caused CNN to be fined $325,000 for saying the word “shit”?

Bits in the Air for 40 points Answer George Bush in CNN cable network aired Bush’s “accidental” microphone comments on the air.

Bits in the Air for 50 points Who is Michael Marcus and how has he changed our lives”?

Bits in the Air for 50 points Answer Got the FCC to regulate a low-power transmission band that enabled spread spectrum technology used in WiFi and cell phones.

Needles in the Haystack for 10 points What make the early Internet more like a library?

Needles in the Haystack for 10 points Answer Universities and Big Businesses mostly posted information which was organized by categories

Needles in the Haystack for 20 points In the following search engine steps, where is the dividing line between the background vs. the foreground steps? 1. Gather information 2.Keep copies 3.Build an index 4.Understand the query 5.Determine the relevance of each possible result to the query 6.Determine the ranking of the relevant results 7.Present the results

Needles in the Haystack for 20 points The dividing line between the background vs. the foreground steps: 1. Gather information 2.Keep copies 3.Build an index 4.Understand the query 5.Determine the relevance of each possible result to the query 6.Determine the ranking of the relevant results 7.Present the results

Needles in the Haystack for 30 points What’s the difference between a sponsored and an “organic” search result?

Needles in the Haystack for 30 points Answer A sponsored search result is pay-for- placement advertisement while an “organic” search result is one found through the search engines normal process

Needles in the Haystack for 40 points Why do search engines track individual search histories?

Needles in the Haystack for 40 points Answer Search engines track an individual’s search history because knowing about you can improve your search quality. USA PATRIOT Act requires search engine provides to provide search history under certain circumstances.

Needles in the Haystack for 50 points What percentage of the Chinese version of Google on 10,000 English test words resulted in censored responses?

Needles in the Haystack for 50 points Answer 9% of the responses were censored