Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Slides:



Advertisements
Similar presentations
“The Scientific Method”
Advertisements

U.S. EXPORT CONTROL LAWS ANALYSIS FOR THE IT MANAGER Presented by Wendy A. Robinson Assistant Attorney General Oregon Department of Justice Salem, Oregon.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
By Mr. Abdalla A. Shaame.  The rights and wrongs of science and technology.
Chapter 17 Law and Terrorism.
Works Citied. How Has the War on Terrorism Affected Civil Liberties? Opposing Viewpoints Civil Liberties Cole, David. The War on Terrorism.
Mark S. Hayes – Blake, Cassels & Graydon LLP Privacy and Security – Some Observations Mark S. Hayes, Blake, Cassels & Graydon LLP 7th CACR Privacy and.
Freedom of the Press In the United States of America “Were it left to me to decide whether we should have a government without newspapers, or newspapers.
Information Law: Expression, Access, Privacy The right to inform The right to be informed The right to secrets.
CSI Effect Mrs. Andres Forensic Science. What is the CSI Effect? CSIBones Criminal minds NCISOthers?
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Maclachlan, Macroeconomics, 9/13/04 1 Principles and Policies I: Macroeconomics Chapter 3: The Evolving U.S. Economy in Perspective.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
John Locke ( ) An English philosopher of the Enlightenment “Natural rights” philosophy.
Jae-Hyun Seong Comp. 450 May  What is Internet?  Why do people use the Internet?  Why do people want to censor the Internet?  Why do people.
Encryption Export Controls in the US Preliminary Research.
Peter Swire Computing Community Consortium/CRA Workshop On Privacy By Design Berkeley February 6, 2015 Privacy by Design: More than Compliance with the.
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
Prof.P.Bekh, Kiev, Ukraine1 Information security in IT society: humanitarian aspects. Prof. Petro Bekh Taras Shevchenko National University of.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Export Controls: General Overview
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Alan Turing and Code Breaking
Japanese Feudalism Feudalism. Centralized Feudalism / a social, political, and economic system based on personal loyalties, class distinctions, and the.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
UDMIS.info Ethics and IS. UDMIS.info The Ethics of IS Ethics and Privacy Ethical Issues Law & Order.
Famous Firsts in Computation MSE 2400 Evolution & Learning
Political Science American Government and Politics Today Chapter 4 Civil Liberties.
Citizenship Issues C.I.4 U.S. Domestic and Foreign Policy Students are able to: 4.2 Describe U.S. foreign policy. Students may indicate this by: – Defining.
1 Devon M. Simmonds University of North Carolina, Wilmington Course Summary.
Encryption: A Brief History Author: Margery Waldron.
Computer Forensics Principles and Practices
Chapter 19 Section 3 Objective: To understand the scope of and the limits on free speech and press.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Produced in conjunction with Tom Briggs, Education and Outreach Officer at Bletchley Park.
How Countries Interact. What is the relationship of the United States to other nations in the world?
There are four major influences that have shaped my teaching philosophy.  My father spent 30 years in the United States Navy..
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
 Family- Will provide love, support, comfort and care.  Police- The police force will be funded by the government and the municipality in which it is.
CHAPTER 1 Introduction Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
An Introduction to Law. Learning Goals:  Investigate what a law is  Describe the 5 functions of law  Distinguish between rules vs. Laws  Discussion/Reflections.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Unit #2.  Would the Charter of Rights and Freedoms have any application in April’s complaint?  What is the difference between a right and a privilege?
5 December Introduction to Privacy. Term Project Changes Feedback on outlines is on its way Change: not being graded Papers due date Moved to Wednesday.
MA “International Relations, Global Economy and Strategic Analysis” COURSE OUTLINE.
U.S. Constitution The Bill of Rights By: Leah Thompson.
Resolve an Ethical Problem Slide Presentation
 Family- Will provide love, support, comfort and care.  Police- The police force will be funded by the government and the county in which it is located.
Breaking RSA Encryption Nick Manners. History of Cryptography  Used to be strictly in the domain of governments… state secrets.  Particularly important.
Ch. 15: The Bill of Rights Vocabulary: amendments, bail, citizen, ratify, Constitution.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Government Agencies. State Department 1789 French Revolution caused us to think about having an agency that deals with other countries Secretary of State.
 Current Events  Lecture and Vocab  Group Activity  Formative Worksheet  Exit Today Objective: You will be able to define the principles of government.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
First 10 Amendments to the United States Constitution.
Revision Session 6 The Media. So what is the media?
Bell work: Create the chart below and fill it out in your notebook. CapitalismSocialismCommunism Good- Advantage Bad- Disadvantage Example Countries.
Moral, Ethical, legal and cultural issues How technical innovation leads to moral, ethical, legal and cultural issues How our own moral and ethical beliefs.
Data Protection Act and Other Laws
Presentation to Ethics Network
Amendments to the Constitution Bill of Rights
Ethical and Social Issues in Information Systems
The first 10 amendments to the U. S. Constitution
Technology Changes History
Privacy Through Anonymous Connection and Browsing
America (17-18th century).
US Constitution 1 2 2nd form of National Gov’t Equality
THE IMPORTANCE OF ETHICS IN FUNERAL SERVICE Presented by: Ken Whittaker Whittaker Funeral Support Services.
Research Infrastructures: Ensuring trust and quality of data
Cryptography a Presentation Prepared by Vytautas Kondratas.
Presentation transcript:

Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama

Outline Ethics Data, Computers, and Networks Ciphers in War & Peace Caesar Turing ITAR --- Computer Security as `military weapons’ Very `Strong’ Computer Security Has the Game Changed? Economic Applications Human Rights Applications

Objectives Philosophical and Historical Perspective Understanding the Foundations Keeping Data Secure Why keep computers secure? `Bad’ People using Computer Security Who’s side am I on, anyway? It is not all about War! Examples from Humanistic Applications

Ethics Rules, standards, principles: Govern `right’ conduct Who is to say what is `right’ ? What information about you is on Computer? What standards do you expect? Privacy Rights In Different Countries

Ethics Free, Capitalist Societies and Ethics Freedom of speech, association, … Freedom of the press Must be able to demonstrate `some truth’ Technology has been an enabler here! Printing Press TV, Radio The Internet!

Sword and Plow-share All technology is a double-edge sword Applications can be good or bad Almost every Technological Advance Is intended to do Good Unfortunately, high ethical standards are not universal Further, what is ethical can be subjective

Sword and Plow-share Albert Einstein: “Concern for man himself must always constitute the chief objective of all technological effort” So that: “the results of our scientific thinking may be a blessing to mankind, and not a curse”

Algorithms and Secret Codes Julius Caesar Credited with the Caesar cipher Encryption Algorithm “2001” by Kubrick Computer named HAL Shift-by-one: H  I A  B L  M

Computers and Secret Codes Alan M. Turing Famous Mathematician/Computer Scientist Computer Science’s Turing Award Team Cracked the “Nazi Enigma” Helped Allies Win the War Used electro-mechanical computers Towards general Universal stored program computer

Much Stronger Ciphers Today 1970s “Bad News” in Computer Science: Some classes of problems seem very hard to solve! 1970s-1980s: Reframe “Bad News” to “Good News” for Computer Security! Use seemingly very hard problems to hide secrets!

An Example `Hard’ Problem Towers of Hanoi Start Configuration A BC

An Example `Hard’ Problem Rules Move Only One Disk at a Time! Smaller Disks Must Be on Top! Final Configuration Desired: A BC

An Example `Hard’ Problem What `Algorithm’ Can We Use? ABC ABC ABC

An Example `Hard’ Problem More of the `algorithm’ ABC ABC ABC

An Example `Hard’ Problem Finally: ABC

An Example `Hard’ Problem What about 4 Disks? ABC ABC How Much MORE work than for 3 Disks?

The ITAR Controversy ITAR & Related Laws International Traffic in Arms Regulations Good Intent to Restrict Export Restrict Strong Ciphers to the US, Canada & Allies Bad Economic Consequences Put US software sales at a disadvantage Other Consequences?

Computers in Society How do Human Rights Groups use Computer Security? Justice Brandeis: "Sunlight is the best disinfectant." Getting detailed information Out Using Laptops and Cellular Videotape

Computers in Society What does Encryption Do Here? Hide the data (testimony) from Rights Violators Until it is safely stored Hide the identities of those whom testify Hide the Enablers helping people fight for Human Rights Allow Secret Transmission of Data

Computers in Society Documenting Human Rights Abuses Gain Understanding of Scale, types, … Present detailed facts to United Nations, … Prepare for intervention De-motivate Rights Abusers Presents the possibility of the real history existing!

Computers in Society The International Center for Human Rights Research and partners 5,000 Human Rights Violation Testimonies Between 1994 and 1995 No paper trail Easy analysis of data Extremely strong Ciphers!

Computers in Society Unfortunate data to gather Does not diminish its importance Forensic Analysis of Data Very sensitive data Time sensitive, need speed Storing, understanding and analyzing data Successful long-term Intervention requires (deep) Understanding

Computers in Society Haiti between 1993 and 1994 Political Murders Peak At Certain Times Document and Chronicle High Coordination of Political Terror Must be Government Sponsored Police and underground criminals coordinated Likely explanation: Terrorize people and aid workers to reject calls for US intervention

Conclusions Computers & Information About us Need Computer Security! Many Ethical Issues Arise with Computer Security Good and Bad Uses Many `Hard’ Ciphers Exist We can use Computer Security for Many Good things Let’s Keep it that way!