Presentation is loading. Please wait.

Presentation is loading. Please wait.

Week 13 LBSC 690 Information Technology Social Issues.

Similar presentations


Presentation on theme: "Week 13 LBSC 690 Information Technology Social Issues."— Presentation transcript:

1 Week 13 LBSC 690 Information Technology Social Issues

2 Agenda Questions Equitable access Appropriate use Project demonstrations

3 Equitable Access Computing facilities –Hardware, software Networks –Speed, continuity Information sources –Fee-based, language Skills –System, access strategies, information use

4 Computing as a Social Process Ownership Identity Privacy Integrity

5 Ownership Who has the right to use a computer? Who establishes this policy? How? –What equity considerations are raised? Can someone else deny access? –Denial of service attacks How can denial of service be prevented? –Who can gain access and what can they do?

6 Identity Establishing identity permits access control What is identity in cyberspace? –Attribution When is it desirable? –Impersonation How can it be prevented? Forgery is really easy –Just set up your mailer with bogus name and email

7 Anonymity Serves several purposes –Sensitive issues on discussion groups –Brainstorming –Whistleblowers –Marketing (“Spam”) Common techniques –Anonymous remailers –Pseudonyms

8 Privacy What privacy rights do computer users have? –On email? –When using computers at work? At school? –What about your home computer? What about data about you? –In government computers? –Collected by companies and organizations? Does obscurity offer any privacy?

9 Privacy Protection Privacy Act of 1974 –Applies only to government records TrustE certification guidelines –Site-specific privacy policies –Federal Trade Commission enforcement Organizational monitoring

10 Integrity How do you know what’s there is correct? –Attribution is invalid if the contents can change Access control would be one solution –No system with people has perfect access control Risks digest provides plenty of examples! Encryption offers an alternative

11 Denial of Service Attacks Viruses –Platform dependent –Typically binary Virus checkers –Need frequent updates Flooding –The Internet worm –Chain letters

12 Justifications for Limiting Use Parental control –Web browsing software, time limits Intellectual property protection –Copyright, trade secrets National security –Classified material Censorship

13 Acceptable Use Policies Establish policies Authenticate Authorize Audit Supervise

14 Techniques for Limiting Use Access control –Effective multilevel security is hard to achieve Copy protection –Hardware and software Licensing –Shrinkwrap, Shareware, GNU Public license Digital watermarks –Provide a basis for prosecution

15 Authentication Used to establish identity Two types –Physical (Keys, badges, cardkeys, thumbprints) –Electronic (Passwords, digital signatures) Protected with social structures –Report lost keys –Don’t tell anyone your password Password sniffers will eventually find it

16 Good Passwords Long enough not to be guessed –Programs can try every combination of 4 letters Not in the dictionary –Programs can try every word in a dictionary –And every date, and every proper name,... –And even every pair of words Mix upper case, lower case, numbers, etc. Change it often and use one for each account

17 Access Control Issues Protect system administrator access –Greater potential for damaging acts –What about nefarious system administrators? Trojan horses –Intentionally undocumented access techniques Firewalls –Prevent unfamiliar packets from passing through –Makes it harder for hackers to hurt your system

18 Fair Use Doctrine Balance two desirable characteristics –Financial incentives to produce content –Desirable uses of existing information Safe harbor agreement (1976 legislative history) –Book chapter, magazine article, picture, … Developed in an era of physical documents –Perfect copies/instant delivery alter the balance

19 Recent Copyright Laws Copyright Term Extension Act (CTEA) –Ruled constitutional (Jan 2003, Supreme Court) Digital Millennium Copyright Act (DMCA) –Prohibits circumvention of technical measures –Implements WIPO treaty database protection

20 The Pornography Debate Communications Decency Act (CDA) –Ruled unconstitutional (1997, Supreme Court) Child Online Protection Act (COPA) –Enforcement blocked (March 2003, 3 rd Circuit) Children’s Internet Protection Act (CIPA) –Ruled constitutional (June 2003, Supreme Court)

21 Filtering Technology Any individual approach is imperfect Term-based techniques –Recall/precision tradeoff –Not very useful for images and audio Whitelists and blacklists –Expensive to create manually –Differing opinions, time lag

22 Surveillance Law USA PATRIOT Act –Access to business records (with a court order) –Internet traffic analysis (with a court order) Foreign Intelligence Surveillance Act (FISA) –Secret court for monitoring foreign communications –Special protections for citizens/permanent residents

23 Real-Time Local Surveillance Built-in features of standard software –Browser history, outgoing email folders, etc. “Parental control” logging software –ChatNANNY, Cyber Snoop, FamilyCAM, … Personal firewall software –ZoneAlarm, BlackIce, …

24 Real-Time Centralized Surveillance Proxy server –Set up a Web server and enable proxy function –Configure all browsers to use the proxy server –Store and analyze Web server log files Firewall –Can monitor all applications, not just the Web

25 Forensic Examination Scan for files in obscure locations –Find by content for text, ACDSee for pictures Examine “deleted” disk files –Norton DiskDoctor, … Decode encrypted files –Possible for many older schemes

26 External Monitoring Web tracking –Browser data, clickthrough, cookies, … Packet sniffers –Detect passwords, reconstruct packets, … Law enforcement –Carnivore (US), RIP (UK), … National security –Echelon (US), SORM (Russia), …

27 Mailing List “Nettiquite” Send private replies unless a public one is needed Don’t send unsubscribe requests to the list Read the FAQ before asking one Avoid things that start flames, unless you intend to

28 Project Demonstrations Scheduled in advance Targeted for 30 minutes Web pages in my office Databases anywhere you need to be Some time on Dec 9, 10, 11 –Get your reservations in early! At least one person from a team must come –But everyone is welcome!

29 Project Demonstrations Starts with a brief structured test –I’ll pick a spec requirement and use the test plan Then you can show me around –You guide, I’ll drive I’ll run off the road a lot, though, to see what happens For web pages, I may try another browser or two I’ll award the group’s grade on the spot –Perfection is not required, only greatness!


Download ppt "Week 13 LBSC 690 Information Technology Social Issues."

Similar presentations


Ads by Google