Article by Simon Garfinkel Presentation by Adam Miller.
-
Upload
marsha-dawson -
Category
Documents
-
view
224 -
download
2
Transcript of Article by Simon Garfinkel Presentation by Adam Miller.
Privacy Requires Security, Not Abstinence: Protecting an
Inalienable Right in the Age of Facebook
Article by Simon GarfinkelPresentation by Adam Miller
The Constitution◦ There are no laws specifically stating the right to
privacy◦ Amendments imply privacy rights
Third, Fourth, and Fifth Amendments (Restriction of soldiers being quartered in homes, unreasonable search and seizures, and being a witness against yourself, respectively)
The Computer◦ Consumer data banks
Computers made it easier to store vast amounts of personal data (credit agencies)
Concerns that data would be misused or errors in the data would negatively impact a person’s life without his or her knowledge of the data being kept about them
Computer (cont.)◦ Govt. developed Code of Fair Information Practice
Straight forward code; no secret data banks, individuals must be able to view their records, must have a way to correct errors, and data banks must be reliable and secure
The Internet◦ All activity on the Internet is mediated
Companies could use information stored for financial gain
Federal Trade Commission prevents businesses from using or selling your information by writing “privacy policies”
Life after 9/11◦ Raised the question: Privacy or Security?◦ Total (Terrorist) Information Awareness
Used advances in technology to attempt to catch terrorists before they attack
Congress shut down organization because it treated everyone as a suspect
Facebook◦ When using Facebook applications, the user is
asked to “Allow access?” How much information is being pulled by the app? By agreeing, you are saying you trust the app and
Facebook’s security and privacy controls
Where We Are Now◦ Data theft by insiders can be solved
Paying employees enough Auditing their work Limiting authority Harshly punishing those who abuse employer’s trust
◦ Answering the question of Security or Privacy The problem isn’t that the information is out there,
it’s that it isn’t secure Spending now on better security in systems will
prevent having to spend a lot more when faulty security is breached
The Constitution explicitly states your right to privacy. True or False?
Questions
False•Which of these is NOT a way to prevent data theft by insiders?• A: Having employees keep data on personal
storage devices• B: Auditing employee work• C: Paying them enough• D: Limiting the authority of any one employee
Answer: A
TIDE (Terrorist Identities Datamart Environment
Stores intelligence information (field reports, captured documents, foreign ally news, data about individuals) that government feels could harm US
Exponential Growth (100,000 files in 03; 435,000 now)
A Growing Watch ListBy Shawn McSweeney
Half of triggered names in 04 and 05 were misidentified (10 of thousands in total)
Cat Stevens Story Security Issues
Issues
Roughly how many pieces of data does TIDE currently store? ◦ A. 100,000◦ B. 435,000◦ C. 755,000◦ D. 2.3 Million
A quarter of the triggered watch list names were misidentified.
Questions
“People often claim that one of every three large-scale software systems gets canceled mid-project. Of those that do make it out the door, three-quarters are never implemented: some do not work as intended; others are just shelved.”
The Software WarsBy Stephanie Moore
Common Mistakes in Software Creation◦ “Metaphysical Absence”◦ Unreachable deadlines◦ Shortages of “can-do” attitudes
Why you can’t understand your computer!
Obtain the correct tools Keep it simple Don’t stifle creativity!
Suggestions for Future Software Inventors
Questions1. The nonexistence of abstract thought is known as:a. technical confusinonb. metaphysical absence c. daydreamingd. psychological absence
Answer: B
2. Setting unreachable goals will motivate employees to give their best efforts.True or False?
Answer: False
Cyber Warfare Spring of 2007, Russia Estonian monument was moved by the Red
Army from capital city to the outskirt of town
Bogus Requests-Requests for information from computers around the world
Banks, Media Outlets, and Ministries were hacked
Most publicized hack in recent history
China Most active for hacking computers Washington accused China of hacking into
government computer networks June 2007-Hacked into Pentagon Network Suspected of hacking in Britain, France,
Germany, South Korea, and Taiwan Russian and China both denied the
accusations.
U.S. Cyber Warfare William Arkin, Defense Analyst
◦ “Our abilities to penetrate into enemy computer networks, our ability to exploit communication networks, to manipulate digital information, is real.”
U.S. has technologies capable of penetrating and jamming enemy networks
Cyber-Warfare Tactics
Request information while masking the location of primary attacker
Use of malware, spyware, and other programs to steal information without user’s knowledge
Cyber attacks aimed at critical infrastructure-less common, but more serious and damaging◦ Nuclear Power Plant Control Systems◦ Banks and Subways
Patching the Hole Until recently, U.S. government did not
emphasize on safety from cyber attacks Difficulty in finding the cyber threat This is getting more serious and more time
demanding U.S. is a big target Cyber attacks on the U.S. economy may be
the worst case U.S. claimed that their systems are secure
and safe
Review Questions What country is mostly blame for cyber
attacks?
TRUE or FALSE: U.S. have technologies capable of penetrating and jamming enemy networks?
Article by William J. Astore Presentation by Raphael Martinez
Geeks and Hackers, Uncle Sam’s Cyber Force Wants you!
• Full spectrum dominance• Air Force stated goal: gain control and
access to any and all networked computers• Contractor bids: “dominant cyber offensive
engagement”• Headquarters throughout United States• Surveys and propaganda
“Above All vision”
Uncertain technical benefits Inflated prices SPADOC (ugly baby)-updated computer
system Air Force Mission Support System- Pilots
planning missions with latest technology Out dated and Basic Disaster
Ugly Babies and Air Force Computer Systems
Total Dominance isn’t realistic Too Expensive Day late and Billion Dollars short
Loving Big “Cyber” Brother