CPS 82, Fall 2008 17.1 Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification.

Slides:



Advertisements
Similar presentations
CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.
Advertisements

Public Key Infrastructure and Applications
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Helping you protect your customers against fraud Division of Finance and Corporate Securities.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Security & Encryption Thomas Fenske & Joseph Minter.
Grid Security. Typical Grid Scenario Users Resources.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Public Information Online. Timothy WhitneyCaroline Aaron.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 CPSC156: The Internet Co-Evolution of Technology and Society Lectures 16 and 17: March 27 and 29, 2007 Solove’s taxonomy of privacy.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
Track II: Introduction and Overview of Financial Services and Information Technology Privacy Policy: Synthesizing Financial Services Industry Privacy David.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Florida Information Protection Act of 2014 (FIPA).
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
1 Protecting Consumers from Themselves Presented by the State Information Security Office & the California Office of Privacy Protection September 13, 2007.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
Cryptography. Introduction Encryption  The art (or science) of putting messages into a code, and the study of those coding techniques. Decryption  The.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Lecture 17 Page 1 CS 236 Online Privacy CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Security, Social and Legal Issues Regarding Software and Internet.
1 Information Security Practice I Lab 5. 2 Cryptography and security Cryptography is the science of using mathematics to encrypt and decrypt data.
Compsci 82, Fall Right to Privacy? l Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence,
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
DIGITAL SIGNATURE.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Identity Theft How it happens and how to avoid it.
Digital Signatures and Digital Certificates Monil Adhikari.
Compsci 82, Fall Right to Privacy? l Article 12 No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence,
Opening up a Checking Account Eliseo Lugo III. 2 To choose the one that’s right for you when the time comes To take the right steps to open a bank account.
Identify Theft in the Cyber Age Ronald J. Leach. What we ’ re going to talk about – Identity Theft How bad is it? How bad is it? How vulnerable are you?
Bank On It FDIC Money Smart for Young Adults Building: Knowledge, Security, Confidence.
Unlinking Private Data
Key management issues in PGP
Privacy and the Law.
Crypto in information security
Florida Information Protection Act of 2014 (FIPA)
A Gift of Fire Third edition Sara Baase
Florida Information Protection Act of 2014 (FIPA)
JP Morgan spends $500 million per year on cyber security
Wiretapping and Encryption
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Who Uses Encryption? Module 7 Section 3.
Lecture 4 - Cryptography
Secure How do you do it? Need to worry about sniffing, modifying, end-user masquerading, replaying. If sender and receiver have shared secret keys,
Unit 8 Network Security.
Company Name | Phone Number | Website | Address
IT and Society Week 2: Privacy.
STRUCTURE OF THE CHAPTER
Presentation transcript:

CPS 82, Fall Privacy l Taxonomy of Privacy  Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing  Aggregation  Identification  Insecurity  Secondary Use  Exclusion

CPS 82, Fall Solove’s Taxonomy l Aggregation  Government  Consumer business  Credit business l Data mining yields “unsettling facts” l Digital dossier  Is it you? l Sex offender laws l Bad data issues l Identification  SSN  National ID card l Need for ID  Bank accounts  Licensing .. l Link data to specific individuals l Anonymity

CPS 82, Fall Taxonomy continued l Insecurity  Identity theft  Distortion (false facts) l Govt, Industry must maintain privacy  Data storage  Data access l Secondary Use  Using data for purpose other than original intent  Fingerprints for govt employees l Who owns information?  Company  Individual

CPS 82, Fall Taxonomy Finished l Exclusion  How is data modified and fixed?  Access to credit report l People should be told about data l How is data shared l Info. Dissemination  Kiss and tell  Medical  Breach of trust l Notification on release of record?  Expectation

CPS 82, Fall From Privacy to Cryptography l How do we keep digital information private?  Keep it to ourselves  Don’t go online  Use cryptography to protect it l When should we really insist on security?  Facebook?  Bank?  Other?

CPS 82, Fall Cryptography l For encryption to work  Not to hard to encrypt (time, money)  Easy to decrypt if allowed (time, money)  Impossible to decrypt if not allowed (??) l Mathematics is the basis for cryptography  Very hard to factor numbers  Very easy to determine if a number is prime  No “security through obscurity” publish methods

CPS 82, Fall PKI: Public Key Infrastructure l From PGP to Hushmail  PGP is “pretty good privacy”, Phil Zimmerman    Originally distributed in book form because of “munitions export restrictions” (1990’s, 40 bit)  Web of trust for public key/private key l How do circumvent these systems?  Keylogging software by federal agents

CPS 82, Fall Cryptography for the masses l l l and-decryption-diginfo/ and-decryption-diginfo/ l crypto/ crypto/