What High School Students Should Know About Cyber Security and Privacy CS4HS Workshop August 2012 Rebecca Wright Rutgers University www.cs.rutgers.edu/~rebecca.wright.

Slides:



Advertisements
Similar presentations
Part I: Making Good Online Choices
Advertisements

The Changing Landscape of Privacy in a Big Data World Privacy in a Big Data World A Symposium of the Board on Research Data and Information September 23,
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
What is identity theft, and how can you protect yourself from it?
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
e-safety and cyber bullying
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Internet Safety By: Caitlyn Stevenson. Information about Internet Safety  The internet is a huge deal, any child that can press a few letters on a keyboard.
How To Protect Your Privacy and Avoid Identity Theft Online.
What is it? Social networking is the grouping of individuals into specific groups, much like a neighborhood subdivision, if you will. Although social.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Security Equipment Equipment for preventing unauthorised access to data & information.
Chapter 10: Authentication Guide to Computer Network Security.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Computing Fundamentals Module Lesson 19 — Using Technology to Solve Problems Computer Literacy BASICS.
Tippecanoe 4-H Computer Project Mikel BergerBret Madsen Ed Evans
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
Protecting Your Personal Information November 15, 2013.
Lecture 19 Page 1 CS 111 Online Authentication for Operating Systems What is authentication? How does the problem apply to operating systems? Techniques.
1 Lecture 8: Authentication of People what you know (password schemes) what you have (keys, smart cards, etc.) what you are (voice recognition, fingerprints,
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Digital Citizenship Project. Netiquette Do’s -Read before you post messages. -Try to keep your postings brief and easy to read. -Be kind when others make.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Intellectual Property Basics
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
WEB 2.0 PATTERNS Carolina Marin. Content  Introduction  The Participation-Collaboration Pattern  The Collaborative Tagging Pattern.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Lecture 7 Page 1 CS 236 Online Authentication CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
It’s more than a game, it’s your life… What do you do online?
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Authentication Lesson Introduction ●Understand the importance of authentication ●Learn how authentication can be implemented ●Understand threats to authentication.
In order to be eligible for federal funding for technology students EGUSD must receive instruction in "Digital Citizenship" These mini-lessons will be.
Access Control / Authenticity Michael Sheppard 11/10/10.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Society & Computers PowerPoint
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
CHILDREN’S INTERNET USAGE STUDY CHILDREN’S INTERNET USAGE STUDY SUMMARY OF FINDINGS.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
PASSWORD SECURITY A Melbourne Athenaeum Library
Creating your online identity
How the internet works By Tom and Josh.
Identity on the Internet
Challenge/Response Authentication
Password Management Limit login attempts Encrypt your passwords
Uses and Limitations of ICT
Information Security Footprint.
HOW BLOCK CHAIN COULD SHAPE THE FUTURE OF WEB DESIGN Many governments in the world have come up with laws of protecting data. This is meant to ensure the.
Unit# 5: Internet and Worldwide Web
Instructor Materials Chapter 5: Ensuring Integrity
G061 - Network Security.
Presentation transcript:

What High School Students Should Know About Cyber Security and Privacy CS4HS Workshop August 2012 Rebecca Wright Rutgers University

Today’s Computing Landscape Today’s high school students are growing up in a world with widespread use of networked communication and computers: – the Internet, WWW, social computing, cloud computing, smart phones, and more! Users are content providers, not just consumers. Computing, especially data- intensive computing, drives advances in almost all fields. “Big data”

Today’s Computing Landscape (2) Embedded systems in cars, medical devices, household appliances, and other consumer products. Critical infrastructure heavily reliant on software for control and management, with increasing human interaction (e.g., Smart grid). Internet boundaries and international boundaries are not always aligned. Users tend to demand functionality over security/privacy (but want both).

What Every HS Student Should Know Minimally, students should know some basic concepts and best practices around cyber security and privacy. – analogous to knowing basic keyboarding skills and how to use important applications like Powerpoint and Word. – these could be covered in a general-purpose technology class, study skills seminars, or take-home or on-line activities to complete at home. Some (ideally all!) should also learn more advanced concepts: ­These could be covered as part of a general computing course, or as a more specialized advanced computing or mathematics course. ­Topics could include cryptography, methods and tools for secure communication, privacy, anonymity, and deanonymization, etc. ­Some modules can be used in other courses (more later).

Basic Concepts and Best Practices password security – don’t use the same password for everything – change your passwords regularly – don’t tell your passwords to anyone else – password managers (such as LastPass and 1Password) can help back up important documents – important for when attacks or accidents occur

Basic Concepts and Best Practices (2) privacy, understanding what is and isn’t private online safety ­good resources at and – covers social media usage, cyberbullying, photo sharing, implicitly even sexting, password security, no hacking, no illegal downloads, respect and tolerance.

What Every HS Student Should Know Minimally, students should know some basic concepts and best practices around cyber security and privacy. – analogous to knowing basic keyboarding skills and how to use important applications like Powerpoint and Word. – these could be covered in a general-purpose technology class, study skills seminars, or take-home or on-line activities to complete at home. Some (ideally all!) should also learn more advanced concepts: ­These could be covered as part of a general computing course, or as a more specialized advanced computing or mathematics course. ­Topics could include cryptography, methods and tools for secure communication, privacy, anonymity, and deanonymization, etc. ­Some modules can be used in other courses (more later).

Example 1: Privacy Means different things to different people, to different cultures, and in different contexts. Appropriate uses of data: – What is appropriate? – Who gets to decide? – What if different stakeholders disagree? Simple approaches to “anonymization” don’t work in today’s world where many data sources are readily available. Thinking about users, uses, and usability is critical. ­Includes recognizing that different parties have different goals and values.

Personally Identifiable Information Many current privacy policies and solutions are based on the concept of “personally identifiable information” (PII). However, this concept is not robust in the face of today’s realities. Any interesting and relatively accurate data about someone can be personally identifiable if you have enough of it and appropriate auxiliary information. In today’s data landscape, both of these are often available. Examples: Sweeney’s work [Swe90’s], AOL web search data [NYT06], Netflix challenge data [NS08], social network reidentification [BDK07], …

Reidentification Sweeney: 87% of the US population can be uniquely identified by their date of birth, 5-digit zip code, and gender. AOL search logs released August 2006: user IDs and IP addresses removed, but replaced by unique random identifiers. Some queries provide information about who the querier is, others give insight into the querier ’ s mind. Birth date Zip code Gender “ Innocuous ” database with names. Allows complete or partial reidentification of individuals in sensitive database.

Netflix Case Study (1) Netflix has been accused of violating US privacy laws in five separate lawsuits filed during These lawsuits argue that Netflix holds onto customer information (credit card numbers and rental histories) long after customers cancel their memberships, claimed to be in violation of the Video Privacy Protection Act (VPPA). Evidence includes customers receiving messages after unsubscribing saying things like “We’d love to have you come back. We’ve retained all of your video choices.”

Netflix Case Study (2) In 2006, Netflix held a contest challenging computer scientists to make a better move-recommendation algorithm. The reward would pay $1 million to the winners. Data was made available to contestants including 100 million ratings and the date of each rating, with unique ID numbers in place of customers’ names and with some errors introduced to protect privacy. Soon after the contest began, a University of Texas professor and his PhD student identified several NetFlix users by comparing their “anonymous” reviews in the Netflix data to ones posted on the Internet Movie Data Base website. Revelations included information about their political leanings and sexual orientation. In 2009, a woman sued Netflix because it revealed information that could lead others to draw conclusions about her closeted sexual orientation. This led in part to the cancellation of a second Netflix Prize competition in 2010.

Case Study Privacy Questions 1.What private information is collected and how is it collected? 2.Could someone’s privacy be violated? Why and how, or why not? 3.Who could benefit from sharing the private information or from combining it with information from other sources? Would such acts be justifiable? 4.How could privacy violations be prevented in this situation? Are the technological strategies for better protecting privacy? 5.What are the pros, cons, and compromises resulting from the sharing of private information in this situation? 6.How has this case study affected your thinking about privacy?

Example 2: User Authentication Initial idea behind passwords: – a good password should be easy to remember but hard to guess. – if this holds, then passwords can be used as an authentication mechanism. It turns out this ideal is quite difficult to achieve. – things that are easy to remember are often easy to guess as well, particularly if the guesser has some information about you. – people often forget their passwords, so backup methods are needed. (These could also be called “security workaround mechanisms.”)

Three Kinds of Authenticators Something You Know – Passwords, life questions, pass phrases/images/sequences/etc. Something You Have – A magnetic strip card – Hardware challenge/response devices and cryptographic calculators (such as RSA’s SecureID) Something You Are – Biometrics such as fingerprint scans, iris scans – Characteristics such as keystroke typing patterns

Difficulties with Passwords Online guessing attacks: – if an attacker has a good idea what the password is, or if the system allows unlimited guesses, they can simply try to log in as you. – most systems have some kind of lockout after a small number of failed attempts. Offline guessing attacks: – many systems have stored or communicated values based on user passwords that don’t directly reveal the password, but allow an attacker to determine whether a guess is correct or not. – these “checkable records” can be used to mount an offline guessing attack. – if a password is known to be a single English word in the English dictionary (of about 250,000 words) and each one could be checked in 1 millisecond, then the password could be identified in less than 250,000 milliseconds, or 250 seconds, under 5 minutes. – this is why longer, more random passwords using a larger character set is advisable! Backup mechanisms are often weaker (especially if talking to a human is involved: read the account of the recent hacking of a Wired reporter!)

Difficulties with Tokens people don’t like to carry them around. they can be lost, so need to be used with an additional mechanism (2-factor authentication). a common 2-factor authentication mechanism involves a password plus a hardware device. among other benefits, this can be used to ensure that there is no checkable record that can be used for an offline dictionary attack.

Difficulties with Biometrics False positives (someone else’s fingerprint is recognized as yours) and false negatives (your own fingerprint is not recognized as yours). theft (stealing a finger, with or without its person attached – both bad!) forgery of the biometric (“gummy” fingers made from gelatin based on “lifted” fingerprints) forgery of the sensor (how easily this is doable depends on the setting) revocation not possible

Today and The Future All three of these are currently in use. Passwords remain the standard for widespread application, despite their issues. Two-factor authentication involving hardware tokens is common for many business uses. Biometrics are coming into more widespread use, particularly in some government applications (and in the movies).

What Every HS Student Should Know Minimally, students should know some basic concepts and best practices around cyber security and privacy. – analogous to knowing basic keyboarding skills and how to use important applications like Powerpoint and Word. – these could be covered in a general-purpose technology class, study skills seminars, or take-home or on-line activities to complete at home. Some (ideally all!) should also learn more advanced concepts: ­These could be covered as part of a general computing course, or as a more specialized advanced computing or mathematics course. ­Topics could include cryptography, methods and tools for secure communication, privacy, anonymity, and deanonymization, etc. ­Some modules can be used in other courses (more later).

More info: dimacs.rutgers.edu/VCTAL or

VCTAL Modules In testing: – It’s an Electrifying Idea! explores whether it’s time to buy an electric car by examining its cost to own and convenience to operate. – Heart Transplants, the NFL Draft, and Computational Thinking explores how groups of people make decisions on whom to select out of a group of eligible candidates. – Network Capacity Expansion and Utilization uses simple simulations to help students think about congestion and capacity when constructing networks and choosing routes. – Internet Privacy employs a series of case studies and activities to highlight privacy issues and solutions.

VCTAL Modules In development: – Fair and Stable Matching explores how to match players from two distinct sets, each with preferences on the other, when we want the resulting matches to be both stable and fair. – Tomography and Reconstruction introduces the science of examining internal structures with external measurements. – Foolproof Codes and Ciphers moves from use of code in WWII to more current uses of codes. – Polynomiography and Art encourages computational thinking through one of the most basic and fundamental tasks in sciences and mathematics: solving a polynomial equation. – Tragedy of the Commons – or Is It? looks at what makes most real-life commons, such as Internet access, robust and self- stabilizing. – Connect Four and Games That Can Be More than Just Fun challenges students to find an efficient algorithm to produce perfect play from any configuration.

VCTAL: Internet Privacy Module Day 1: discussion of privacy, information pooling hands-on activity. Days 2 and 3: privacy case studies: – Netflix: Who’s Watching What You Watch? – Facebook’s Missing Beacon – 23andMe and You and You?! – Google Auto Complete – Are Loyalty Cards Loyal to You? – Should Foursquare Know Where You Aren’t? Day 4: secure multiparty computation (optional, more mathematical hands-on activity) Day 5 and out-of-class project: Compute-a-Date project.

More info: dimacs.rutgers.edu/VCTAL or

What High School Students Should Know About Cyber Security and Privacy CS4HS Workshop August 2012 Rebecca Wright Rutgers University