Presentation is loading. Please wait.

Presentation is loading. Please wait.

Article by Simon Garfinkel Presentation by Adam Miller.

Similar presentations


Presentation on theme: "Article by Simon Garfinkel Presentation by Adam Miller."— Presentation transcript:

1 Article by Simon Garfinkel Presentation by Adam Miller

2  The Constitution ◦ There are no laws specifically stating the right to privacy ◦ Amendments imply privacy rights  Third, Fourth, and Fifth Amendments (Restriction of soldiers being quartered in homes, unreasonable search and seizures, and being a witness against yourself, respectively)  The Computer ◦ Consumer data banks  Computers made it easier to store vast amounts of personal data (credit agencies)  Concerns that data would be misused or errors in the data would negatively impact a person’s life without his or her knowledge of the data being kept about them

3  Computer (cont.) ◦ Govt. developed Code of Fair Information Practice  Straight forward code; no secret data banks, individuals must be able to view their records, must have a way to correct errors, and data banks must be reliable and secure  The Internet ◦ All activity on the Internet is mediated  Companies could use information stored for financial gain  Federal Trade Commission prevents businesses from using or selling your information by writing “privacy policies”

4  Life after 9/11 ◦ Raised the question: Privacy or Security? ◦ Total (Terrorist) Information Awareness  Used advances in technology to attempt to catch terrorists before they attack  Congress shut down organization because it treated everyone as a suspect  Facebook ◦ When using Facebook applications, the user is asked to “Allow access?”  How much information is being pulled by the app?  By agreeing, you are saying you trust the app and Facebook’s security and privacy controls

5  Where We Are Now ◦ Data theft by insiders can be solved  Paying employees enough  Auditing their work  Limiting authority  Harshly punishing those who abuse employer’s trust ◦ Answering the question of Security or Privacy  The problem isn’t that the information is out there, it’s that it isn’t secure  Spending now on better security in systems will prevent having to spend a lot more when faulty security is breached

6  The Constitution explicitly states your right to privacy. True or False? False Which of these is NOT a way to prevent data theft by insiders? A: Having employees keep data on personal storage devices B: Auditing employee work C: Paying them enough D: Limiting the authority of any one employee Answer: A

7  TIDE (Terrorist Identities Datamart Environment  Stores intelligence information (field reports, captured documents, foreign ally news, data about individuals) that government feels could harm US  Exponential Growth (100,000 files in 03; 435,000 now) By Shawn McSweeney

8  Half of triggered names in 04 and 05 were misidentified (10 of thousands in total)  Cat Stevens Story  Security Issues

9  Roughly how many pieces of data does TIDE currently store? ◦ A. 100,000 ◦ B. 435,000 ◦ C. 755,000 ◦ D. 2.3 Million  A quarter of the triggered watch list names were misidentified.

10 “People often claim that one of every three large-scale software systems gets canceled mid-project. Of those that do make it out the door, three-quarters are never implemented: some do not work as intended; others are just shelved.” By Stephanie Moore

11  Common Mistakes in Software Creation ◦ “Metaphysical Absence” ◦ Unreachable deadlines ◦ Shortages of “can-do” attitudes

12  Obtain the correct tools  Keep it simple  Don’t stifle creativity!

13  Questions 1. The nonexistence of abstract thought is known as: a. technical confusinon b. metaphysical absence c. daydreaming d. psychological absence Answer: B 2. Setting unreachable goals will motivate employees to give their best efforts. True or False? Answer: False

14 By Greg Bruno Presentation by: Khaing Oo

15  Spring of 2007, Russia  Estonian monument was moved by the Red Army from capital city to the outskirt of town  Bogus Requests-Requests for information from computers around the world  Banks, Media Outlets, and Ministries were hacked  Most publicized hack in recent history

16  Most active for hacking computers  Washington accused China of hacking into government computer networks  June 2007-Hacked into Pentagon Network  Suspected of hacking in Britain, France, Germany, South Korea, and Taiwan  Russian and China both denied the accusations.

17  William Arkin, Defense Analyst ◦ “Our abilities to penetrate into enemy computer networks, our ability to exploit communication networks, to manipulate digital information, is real.”  U.S. has technologies capable of penetrating and jamming enemy networks

18  Request information while masking the location of primary attacker  Use of malware, spyware, and other programs to steal information without user’s knowledge  Cyber attacks aimed at critical infrastructure- less common, but more serious and damaging ◦ Nuclear Power Plant Control Systems ◦ Banks and Subways

19  Until recently, U.S. government did not emphasize on safety from cyber attacks  Difficulty in finding the cyber threat  This is getting more serious and more time demanding  U.S. is a big target  Cyber attacks on the U.S. economy may be the worst case  U.S. claimed that their systems are secure and safe

20  What country is mostly blame for cyber attacks?  TRUE or FALSE: U.S. have technologies capable of penetrating and jamming enemy networks?

21  Article by William J. Astore  Presentation by Raphael Martinez

22 Full spectrum dominance Air Force stated goal: gain control and access to any and all networked computers Contractor bids: “dominant cyber offensive engagement” Headquarters throughout United States Surveys and propaganda

23  Uncertain technical benefits  Inflated prices  SPADOC (ugly baby)-updated computer system  Air Force Mission Support System- Pilots planning missions with latest technology  Out dated and Basic Disaster

24  Total Dominance isn’t realistic  Too Expensive  Day late and Billion Dollars short

25  The goal of the Air Force is to gain control and access to any and all networked computers. T or F?  True  Air Force computer systems are relatively inexpensive and cost-efficient. T or F?  False


Download ppt "Article by Simon Garfinkel Presentation by Adam Miller."

Similar presentations


Ads by Google