



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Lecture notes for a course on computers and the internet, focusing on privacy and encryption. It discusses the erosion of privacy through computer databases and the internet, privacy in cyberspace, collection of information without consent, and the problem of key interception in encryption. It also explains the use of cookies, global unique identifiers, and digital signatures. The notes include class exercises and web links for further information.
Typology: Study notes
1 / 6
This page cannot be seen from the preview
Don't miss anything!
I. Privacy and Encryption CIYF 12. Describe the ways in which computer databases and the Internet are combining to erode privacy. Note that traditional forms of information collection such as telephone surveys and supermarket club cards are being combined with computer databases to endanger personal privacy. Compare the terms privacy and encryption. Define privacy as an individual’s ability to restrict or eliminate the collection, use, and sale of confidential personal information. Explain that encryption refers to a coding or scrambling process by which a message is rendered unreadable by anyone except the intended recipient. Describe identity theft and its impact on peoples’ lives. List the information required to pull off identity theft, including an address, Social Security number, date of birth, or other seemingly innocuous bits of data. Class Exercise : Engage students in a discussion about identity theft. You may find that several students have had such an experience, or may know someone who has. Web Link : Refer students to the U.S. Government’s central Web site on identity theft (www.consumer.gov/idtheft/) for more information. II. Privacy in Cyberspace CIYF 12. A. The Problem: Collection of Information without Consent Describe the ways in which personal information is collected without consent. Using Figure 12.2, discuss how electronic databases track and combine information on individuals. Note that in the United States, individuals have no recourse against those who collect sensitive personal information. B. The Internet Factor Describe how database vendors sell the information they have gathered to many different types of customers, some who have legitimate reasons for wanting the information, and some who have wicked intentions. Web Link : Encourage students to visit the Electronic Privacy Information Center (EPIC) at www.epic.org/ for more information on privacy issues. C. Protecting Privacy: Basic Principles Privacy advocates believe that governments should protect the privacy of their citizens. Describe the basic human privacy rights afforded to all citizens in the European Union: Consumers must be informed when information is being collected about them. Consumers must be allowed to choose whether or not they want to divulge the information. Consumers must be allowed to remove information about themselves upon request. Note that U.S. citizens do not enjoy these same rights. Describe some of the various Federal and state laws that attempt to provide privacy protection in the United States.
Class Exercise : Lead students in an exercise to create their own declaration of personal privacy rights. Would they desire the same rights as citizens of the European Union? Are there other items that should be included in a declaration for the United States? D. Anonymity Define anonymity as the ability to convey a message without disclosing your name or identity. Briefly explain the difference between defamation and libel. III. How Is Technology Eroding Privacy and Anonymity? CIYF 12. Review how technology is enabling various organizations to collect information and defeat the concept of anonymous speech. List the two technologies that are commonly used, cookies and global unique identifiers. A. Cookies Define cookies as small files that are written to your computer’s hard disk by many of the Web sites you visit for the purpose of recording information so it is available for future browsing sessions. Explain how ad networks work and describe the use of banner ads. Using the Richard Smith example, show how DoubleClick, Inc. was able to gather key information about his identity. List different types of information that can be transmitted to Internet ad networks, including:
Describe cryptanalysis as another word for code breaking. Explain that one way to break a code is through the brute force method. Explain how key length can be used to prevent cryptanalysis. D. Public Key Encryption Algorithms Teaching Tip : While much of this information is interesting, it may constitute “information overload” for some of your students. To keep their attention, make your discussion of the topics in this section brief. Very briefly discuss some public key encryption algorithms, including the Diffie-Hellman algorithm , the RSA encryption algorithm , and Fortezza. E. Digital Signatures and Certificates Relate the use of digital signatures and digital certificates to public key encryption. Define hash key. Further explain digital certificates defining the terms certificate authority (CA) and web of trust. F. Toward a Public Key Infrastructure (PKA) Describe why a public key infrastructure (PKI) is important, yet is slow in development. Discuss some of the issues surrounding the adoption of a public key infrastructure. List and describe the three alternatives to PKI being proposed by U.S. government agencies: the Clipper Chip shown in Figure 12.12 which uses a back door , the key escrow plan proposed by the Clinton administration, and a new back door-based system called key recovery. Web Link : Students can learn more about cryptography issues by visiting the Web site www.cdt.org/crypto. Class Exercise : Refer to the Currents section “Navajo Code Talkers.” The following questions may be posed to lead students in a discussion about the Navajo code talkers:
have nothing to hide, and only criminals would use encryption. Lead the class in a discussion of the implications of this statement. Describe the Clipper Chip, key escrow plan and key recovery alternatives to public key encryption proposed by U.S. government agencies. H. The Academic Angle Explain the copyright management infrastructure (CMI) and the Digital Millennium Copyright Act (DMCA). Web Link : For current information about the field of cryptographic research, encourage students to visit The International Association of Cryptographic Research (www.iacr.org/). Describe the situation of encryption technologies outside of the United States. Class Exercise : Refer students to the Impacts section “Is the Government Watching You?” The following questions may be posed to lead students in a discussion of Echelon: