Download presentation
Presentation is loading. Please wait.
Published byMoris Barrett Modified over 9 years ago
1
CPS 82, Fall 2008 17.1 Privacy l Taxonomy of Privacy Understanding Privacy, Daniel Solove, MIT Press 2008 l Information Processing Aggregation Identification Insecurity Secondary Use Exclusion
2
CPS 82, Fall 2008 17.2 Solove’s Taxonomy l Aggregation Government Consumer business Credit business l Data mining yields “unsettling facts” l Digital dossier Is it you? l Sex offender laws l Bad data issues l Identification SSN National ID card l Need for ID Bank accounts Licensing .. l Link data to specific individuals l Anonymity
3
CPS 82, Fall 2008 17.3 Taxonomy continued l Insecurity Identity theft Distortion (false facts) l Govt, Industry must maintain privacy Data storage Data access l Secondary Use Using data for purpose other than original intent Fingerprints for govt employees l Who owns information? Company Individual
4
CPS 82, Fall 2008 17.4 Taxonomy Finished l Exclusion How is data modified and fixed? Access to credit report l People should be told about data l How is data shared l Info. Dissemination Kiss and tell Medical Breach of trust l Notification on release of record? Expectation
5
CPS 82, Fall 2008 17.5 From Privacy to Cryptography l How do we keep digital information private? Keep it to ourselves Don’t go online Use cryptography to protect it l When should we really insist on security? Facebook? Bank? Other?
6
CPS 82, Fall 2008 17.6 Cryptography l For encryption to work Not to hard to encrypt (time, money) Easy to decrypt if allowed (time, money) Impossible to decrypt if not allowed (??) l Mathematics is the basis for cryptography Very hard to factor numbers Very easy to determine if a number is prime No “security through obscurity” publish methods
7
CPS 82, Fall 2008 17.7 PKI: Public Key Infrastructure l From PGP to Hushmail PGP is “pretty good privacy”, Phil Zimmerman http://www.philzimmermann.com/EN/contact/index.html http://www.philzimmermann.com/EN/contact/index.html http://www.philzimmermann.com/EN/audiovideo/index.html http://www.philzimmermann.com/EN/audiovideo/index.html Originally distributed in book form because of “munitions export restrictions” (1990’s, 40 bit) Web of trust for public key/private key l How do circumvent these systems? Keylogging software by federal agents
8
CPS 82, Fall 2008 17.8 Cryptography for the masses l http://www.youtube.com/watch?v=ZDnShu5V99s http://www.youtube.com/watch?v=ZDnShu5V99s l http://www.youtube.com/watch?v=XeaZGt8_j1k http://www.youtube.com/watch?v=XeaZGt8_j1k l http://video.aol.com/video-detail/rsa-encryption- and-decryption-diginfo/1505435307 http://video.aol.com/video-detail/rsa-encryption- and-decryption-diginfo/1505435307 l http://www.catonmat.net/blog/musical-geek-friday- crypto/ http://www.catonmat.net/blog/musical-geek-friday- crypto/
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.