Final review Our final exam will be held on Wednesday, May 3rd from 4:00 to 5:50 in room 109 WWH.

Slides:



Advertisements
Similar presentations
COPYRIGHT AND COPYWRONG Respect Copyright, Celebrate Creativity.
Advertisements

Intellectual Property Image: William J. Wynn.
Computer Crimes and Security Professor Matt Thatcher.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 9: Privacy, Crime, and Security
Get Creative Commons Savvy Mandy Misner, OSU Extended Campus Sue Kunda, OSU Libraries and Press March 11, 2013.
Framing the Public Interest Agenda in Copyright Global Congress on IP and the Public Interest, Washington DC August 25, 2011 Prof. P. Bernt Hugenholtz.
Chapter 10 Privacy and Security McGraw-Hill
Copyright and Alternatives to Copyright Why now? Rita S. Heimes Director, Technology Law Center University of Maine School of Law Rita S. Heimes Director,
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Rights Management Overview Peter B. Hirtle Intellectual Property Officer Cornell University Library
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Cornell Institute for Digital Collections Intellectual Property: Introduction to Copyright Peter B. Hirtle Director Cornell Institute for Digital Collections.
Chapter 5 Intellectual Property & Internet Law
April 7, 2011 Copyright Law. Copyright Infringement?
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
K. Salah1 Legal, Privacy, & Ethical Issues. K. Salah2 Overview Human Controls Applicable to Computer Security The Basic Issues Computer Crime Privacy.
Securing Information Systems
Managing Information And Technology. Chapter Objectives 1.Distinguish between data and information and identify tasks of IS manager 2.Explain how IS managers.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Computer Programming I
I. Origins and intent of Copyright II. Congress and Copyright extensions, the DMCA III. A Response: the Creative Commons License IV. Protecting the commons.
1 The Information Commons and the Future of Innovation, Scholarship & Creativity Gigi B. Sohn President Public Knowledge
COPYRIGHT: A Pirate’s Paradise? Prepared form Com 435 by Donna L. Ferullo, J.D. Director University Copyright Office Donna L. Ferullo.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Session 7 LBSC 690 Information Technology Security.
Page 1 Battling Botnets: Implications for a Cybercrime Strategy July 8, 2010.
Types of Electronic Infection
Yours, Mine and Ours: Copyright in Cyberspace 2005 National LTAP Conference July 26, 2005 Nita Lovejoy Iowa State University.
Copyright Basics Fundamentals you should know Slides produced by the Copyright Education & Consultation Program.
Jeopardy CH4CH5CH6CH7 CH8 Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 5 Intellectual Property.
Copyright 101 By Dr. Bowie. What is Copyright?  Literally right to copy  Benefits the authors/owners Gives them the rights to control their own work.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Final Exam Review. History of Computing Know trends No dates.
Intellectual Property: Introduction to Copyright Peter B. Hirtle Intellectual Property Officer Cornell University Library
Innovation, Copyright, and the Academy University of California Santa Barbara November 2, 2015 Kenneth D. Crews Gipson Hoffman & Pancione (Los Angeles)
Privacy, Security and Ethics
Midterm review Exam is on March 8 th during class.
CPS Digital Copyright. CPS Copyright US Constitution (Article I, Section 8, Clause 8): “To promote the Progress of Science and useful.
Computer and Network Security Brendan Duncombe Bahein Maung.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
6/18/2016 COPYRIGHT AND Fair Use Guidelines “Respect Copyright, Celebrate Creativity”
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Securing Information Systems
Copyright in the Classroom
CS 2315 review.
Add video notes to lecture
E-voting …and why it’s good..
Securing Information Systems
2018 Latest Eccouncil Exam Questions Answers - Eccouncil Dumps PDF
Media Specialist’s Times
A Gift of Fire Third edition Sara Baase
Computer Programming I
Essential Question What are the procedures for voting?
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

Final review Our final exam will be held on Wednesday, May 3rd from 4:00 to 5:50 in room 109 WWH

Final format (same as midterm) Part 1: multiple choice Part 2: written –some shorter answers (1 – 3 sentences) –1 longer question (perhaps a page)

material Basically anything discussed in class or on the website is fair game. –Nothing Bergen covered More specifically…

Code Parts 1 and 2 of the Lessig book REGULABILITY –Chapter 1: Code is Law –Chapter 2: Four Puzzles from Cyberspace –Chapter 3: Is-ism –Chapter 4: Architectures of Control –Chapter 5: Regulating Code CODE AND OTHER REGULATORS –Chapter 6: Cyber-spaces –Chapter 7: What Things Regulate

Topics in the News Net neutrality Aol, Yahoo, Goodmail Patriot Act Google in China Search engine data Broadcast flag / audio flag Data mining

Networking Arpa: arpanet Internet Circuit switching vs. packet switching Broadband IP address DNS protocol

Privacy Anything from the notes What is it? Why is it good? Why is it bad? Third Amendment Public vs private information – how do you disclose your private information? Cookies Credentials Government records National Crime Information Center Code of Fair Information Practices Privacy Act of 1974

Privacy (cont) Covert surveillance Wiretaps and bugs Shamrock Fourth Amendment Patriot Act TIA Data mining Two parties of a transaction Encryption Computers are not necessary for an invasion of privacy but they make old threats more potent.

Organizations EFF DARPA ICANN Verisign ACM NSA

Computer Crime Identity Theft Social security numbers Real ID Act Viruses Worms Trojan Horses Phreaks and Hackers Denial of Service attacks

Computer Reliability Data-Entry / Data Retrieval errors NCIC (National Crime Information Center) –March 2003 (arguments on both sides) Software and Billing errors Software Engineering –Specification –Development –Validation (testing) Software Warranties

Guest lecture material Copyrights –Original intent of founding fathers: Section 8 (The Powers Clauses) congress shall have the power to Clause 8: To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries; –What it has morphed into –Who owns copyright? –Fair use –Public domain –DCMA (Digital Millennium Copyright Act) –Patents –licenses

Guest lecture material Free Software –Free Software and Open Source Software are typically: Copyrighted With a license allowing copying Copying for personal use with no restrictions of any kind at all Redistribution of original software with sources Redistribution of derived works with full sources Derived works must be Free Software –GPL (General Public License)

Guest lecture: electronic voting Electronic Voting –Machine types DRE (direct-recording electronic) DRE w/ VVPT (Voter Verified Paper audit Trail) PCOS (Precinct Counted Optical Scan ) –Rating the systems Security Usability Accessibility Cost –Threats Credibility Privacy Change outcome of an election –Catalog attacks (which is most important) $ Time Informed Participants Insiders –Findings All three system vulnerable Vulnerabilities can be remedied Not currently being remedied Software Attacks Least Difficult Parallel Testing Helpful, Problematic Transparent Randomness Key Wireless Systems Present Problems Effective Procedures For Addressing Evidence of Fraud Key

Guest lecture material Journalism –Citizen journalism –Blogs Outsourcing –What it is? –Benefits –Costs Creative Commons –Do for culture what the GPL did for software –Licenses Attribution Noncommercial No Derivative Works Share Alike