1 Good Security and Privacy Things Steven M. Bellovin

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
POSSIBLE THREATS TO DATA
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Learning to Hide in the Digital Age Can you completely remove your online identity?
Grand Haven Security Assessment By Anthony Gaeta.
Closed Circuit Television - CCTV. In your jotter put the heading “CCTV”. Write down the full name of CCTV CCTV = Closed Circuit Television. Write this.
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
SHOP ONLINE By: Janine Charles. Why you Should Shop Online Open 24/7 Better Prices No sale pressure Easier comparison shopping Greater Selection Convenience.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Cloud Computing Lecture #6 Information Policy Jimmy Lin The iSchool University of Maryland Wednesday, October 7, 2008 This work is licensed under a Creative.
Do you know how to keep yourself safe?
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
The laws Organizations are covered by lots of different laws
Ethical Issues with Cryptography Regulation  Assistance to law enforcement AND  Threats to privacy  Unfair search of property  Obstruction of free.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Operating Systems Concepts 1/e Ruth Watson Chapter 4 Chapter 4 Windows Utilities Ruth Watson.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
2010 Technology Decision Making Roundtable: Cloud Computing Google Apps vs. Daryl Tilley Director of Technology Services Ingham Intermediate School.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
6 Ethics and Privacy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
Why I Need a Mac Reasons a Mac is Most Trusted It Looks Snazy Mac’s are the most renowned computer. That means they have lots of cool options on cases.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
First Amendment Quiz #1. #1 The Establishment Clause of the First Amendment Allows us to speak freely in a public place Allows the government to establish.
3.4 Globalisation. Overview Discuss how ICT has enabled globalisation (for example the ability to contact others in any part of the world day or night.
Freedom of the Press Prior Restraint = censorship of information before publication – Only allowed if it interferes w/ national security Press access at.
INTERNET SAFETY FOR KIDS
Surveillance Jeff Saunders Dr. Garrison CSCI 101 Thurs. 12:30.
Backups. What is a backup. A backup is when someone copies some data (like you may copy and paste your schoolwork!) and sends it to another workstation.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
6 Ethics and Privacy.
Backing up By Betsy Weaver 8H. What is backup, and why should you do it? w So that you don’t lose all your files if you are attacked by a virus or hackers,
Surveillance and More Porsha J. Rice. Surveillance Cameras Nowadays surveillance cameras are virtually everywhere and in places such as: Schools Stores.
VESTA A luxury you can get at a punch of a key. A complete automation for your home, controlling lighting, climate, audio, video, home theater, telephone.
INVINCIBLESERVICES PROTECTING YOUR PRIVACY, SO YOU DON’T HAVE TO.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
1 Internet – The Good, the Bad, and the Ugly Module 4 Section 3.
Digital citizenship can be defined as the norms of appropriate, behavior with regard to technology use.
For and against CCTV and Electronic Tracking By Tom Slack.
Encryption Power Crunch Tyler Morgan. Encryption & Cryptography What it is, methods, and brief description of cryptography.
Seminar on PRESENTED BY Jayesh patel Roll no:6431 L.D.Collage of ENGG. AH-15.
Google Form Report Presentation Fatin Kamilia Mohd Arif Natasha Zaireen Zubir Anis Marjan Azmimurad Nurakhma Shabani Jasni.
RACIAL DISPARITIES IN THE LAW Created by: Cathi, Nicole, Eunice and Jeanell.
AUTOMATING HOME SECURITY RYAN C. KRAUSE. BACKGROUND: HOME SECURITY Many providers including, self-building kits ADT, Gaurdian, Xfinity, LifeShield, Protection.
Privacy, anonymity and other confusing words Przemek Jaroszewski CERT Polska/NASK.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Home Security Options What can I do to deter Burglars?
Anonymity and the Internet
Send photos to one or many receivers
Hotspot Shield Protect Your Online Identity
Online Safety! By: Michelle Deng.
UNIT 4 – THE COST OF FREE LESSON 4.
Working to Keep our Children Safe in a World Filled with Technology
Surveillance in Society
Cloud Testing Shilpi Chugh.
– Communication Technology in a Changing World
ipaD INFORMATION EVENING
Major Difference between CCTV and Surveillance. As we know CCTV and Surveillance Camera both are majorly use as security purpose, but most of us doesn’t.
UNIT 4 – THE COST OF FREE LESSON 6.
If We’re Honest Truth is harder than a lie
REPORT 1 TECHNOLOGY USED BY YOU AT HOME AND AT SCHOOL
Presentation transcript:

1 Good Security and Privacy Things Steven M. Bellovin

2 We Know the Bad Side We know bad things happen on the Internet (I caught my first hackers around 1971) We know there are lots of ways we lose privacy But -- the Internet offers ways options to improve privacy and security

3 A T-shirt for sale in one small US town has a caption that reads: “Small Town (def) a place where you don't have to use your turn signals because everyone knows where you are going.” Carl Ellison et al, 1998

4 Privacy Access to information ‣ Not easily available in small towns? Private purchasing ‣ It’s harder to hide in the physical world ‣ Ubiquitous cameras and license plate readers make that worse

5 Anonymity and Pseudonymity Screen names Multiple personnas Onion routing

6 Free Speech The freedom to speak anonymously or pseudonymously The ability to speak in a different community Freedom of association Censoring the Internet is hard

7 Information Security It’s much easier to encrypt files than pieces of paper It’s much easier to create remote backups of vital data It’s much easier to protect a file against tampering

8 Physical Security Home monitoring cameras Remote control of lights and appliances -- make a vacant house seem occupied The primary use of surveillance cameras is sometimes beneficial, even if only to solve a crime rather than deter it

9 But... Mandatory registration laws Court orders to unmask pseudonyms Data retention laws Hackers make home cameras risky Increasing use of Internet tracking technology Do the threats and dangers outweigh the good?