Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Lecture Notes on Privacy and Encryption in Computers and the Internet, Study notes of Computer Science

Lecture notes for a course on computers and the internet, focusing on privacy and encryption. It discusses the erosion of privacy through computer databases and the internet, privacy in cyberspace, collection of information without consent, and the problem of key interception in encryption. It also explains the use of cookies, global unique identifiers, and digital signatures. The notes include class exercises and web links for further information.

Typology: Study notes

Pre 2010

Uploaded on 08/08/2009

koofers-user-dbn-1
koofers-user-dbn-1 🇺🇸

10 documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CSC 1113 – Introduction to Computers
LECTURE NOTES – CHAPTER 12
I. Privacy and Encryption CIYF 12.03
Describe the ways in which computer databases and the Internet are combining to erode privacy.
Note that traditional forms of information collection such as telephone surveys and supermarket
club cards are being combined with computer databases to endanger personal privacy.
Compare the terms privacy and encryption. Define privacy as an individual’s ability to restrict
or eliminate the collection, use, and sale of confidential personal information. Explain that
encryption refers to a coding or scrambling process by which a message is rendered unreadable
by anyone except the intended recipient.
Describe identity theft and its impact on peoples’ lives. List the information required to pull off
identity theft, including an address, Social Security number, date of birth, or other seemingly
innocuous bits of data.
Class Exercise: Engage students in a discussion about identity theft. You may find that several
students have had such an experience, or may know someone who has.
Web Link: Refer students to the U.S. Government’s central Web site on identity theft
(www.consumer.gov/idtheft/) for more information.
II. Privacy in Cyberspace CIYF 12.04
A. The Problem: Collection of Information without Consent
Describe the ways in which personal information is collected without consent. Using Figure 12.2,
discuss how electronic databases track and combine information on individuals. Note that in the
United States, individuals have no recourse against those who collect sensitive personal
information.
B. The Internet Factor
Describe how database vendors sell the information they have gathered to many different types
of customers, some who have legitimate reasons for wanting the information, and some who have
wicked intentions.
Web Link: Encourage students to visit the Electronic Privacy Information Center (EPIC) at
www.epic.org/ for more information on privacy issues.
C. Protecting Privacy: Basic Principles
Privacy advocates believe that governments should protect the privacy of their citizens. Describe
the basic human privacy rights afforded to all citizens in the European Union:
Consumers must be informed when information is being collected about them.
Consumers must be allowed to choose whether or not they want to divulge the information.
Consumers must be allowed to remove information about themselves upon request.
Note that U.S. citizens do not enjoy these same rights. Describe some of the various Federal and
state laws that attempt to provide privacy protection in the United States.
pf3
pf4
pf5

Partial preview of the text

Download Lecture Notes on Privacy and Encryption in Computers and the Internet and more Study notes Computer Science in PDF only on Docsity!

CSC 1113 – Introduction to Computers

LECTURE NOTES – CHAPTER 12

I. Privacy and Encryption CIYF 12. Describe the ways in which computer databases and the Internet are combining to erode privacy. Note that traditional forms of information collection such as telephone surveys and supermarket club cards are being combined with computer databases to endanger personal privacy. Compare the terms privacy and encryption. Define privacy as an individual’s ability to restrict or eliminate the collection, use, and sale of confidential personal information. Explain that encryption refers to a coding or scrambling process by which a message is rendered unreadable by anyone except the intended recipient. Describe identity theft and its impact on peoples’ lives. List the information required to pull off identity theft, including an address, Social Security number, date of birth, or other seemingly innocuous bits of data. Class Exercise : Engage students in a discussion about identity theft. You may find that several students have had such an experience, or may know someone who has. Web Link : Refer students to the U.S. Government’s central Web site on identity theft (www.consumer.gov/idtheft/) for more information. II. Privacy in Cyberspace CIYF 12. A. The Problem: Collection of Information without Consent Describe the ways in which personal information is collected without consent. Using Figure 12.2, discuss how electronic databases track and combine information on individuals. Note that in the United States, individuals have no recourse against those who collect sensitive personal information. B. The Internet Factor Describe how database vendors sell the information they have gathered to many different types of customers, some who have legitimate reasons for wanting the information, and some who have wicked intentions. Web Link : Encourage students to visit the Electronic Privacy Information Center (EPIC) at www.epic.org/ for more information on privacy issues. C. Protecting Privacy: Basic Principles Privacy advocates believe that governments should protect the privacy of their citizens. Describe the basic human privacy rights afforded to all citizens in the European Union: Consumers must be informed when information is being collected about them. Consumers must be allowed to choose whether or not they want to divulge the information. Consumers must be allowed to remove information about themselves upon request. Note that U.S. citizens do not enjoy these same rights. Describe some of the various Federal and state laws that attempt to provide privacy protection in the United States.

Chapter 12 Lecture Notes

Class Exercise : Lead students in an exercise to create their own declaration of personal privacy rights. Would they desire the same rights as citizens of the European Union? Are there other items that should be included in a declaration for the United States? D. Anonymity Define anonymity as the ability to convey a message without disclosing your name or identity. Briefly explain the difference between defamation and libel. III. How Is Technology Eroding Privacy and Anonymity? CIYF 12. Review how technology is enabling various organizations to collect information and defeat the concept of anonymous speech. List the two technologies that are commonly used, cookies and global unique identifiers. A. Cookies Define cookies as small files that are written to your computer’s hard disk by many of the Web sites you visit for the purpose of recording information so it is available for future browsing sessions. Explain how ad networks work and describe the use of banner ads. Using the Richard Smith example, show how DoubleClick, Inc. was able to gather key information about his identity. List different types of information that can be transmitted to Internet ad networks, including:

  1. Your e-mail address
  2. Your full name
  3. Your mailing address (street, city, state and ZIP code)
  4. Your phone number Transactional data B. Global Unique Identifiers (GUIDs) Define global unique identifiers (GUIDs) as identification numbers that are generated by a computer hardware component or a program. Explain how Microsoft’s .NET Passport fits into the scheme of protecting personal privacy. Web Link : Encourage students to visit the Microsoft .NET Passport Web site (www.passport.net) for more information on this new privacy strategy. Web Link : Refer students to the Web site www.privacy.net/track to see an online demonstration of how ad banner tracking works. IV. Is Self-Regulation Sufficient? CIYF 12. Discuss the debate centered on self-regulation within the technology industry. Introduce both sides of the debate: the marketing industry and consumer advocacy groups.

Chapter 12 Lecture Notes

Describe cryptanalysis as another word for code breaking. Explain that one way to break a code is through the brute force method. Explain how key length can be used to prevent cryptanalysis. D. Public Key Encryption Algorithms Teaching Tip : While much of this information is interesting, it may constitute “information overload” for some of your students. To keep their attention, make your discussion of the topics in this section brief. Very briefly discuss some public key encryption algorithms, including the Diffie-Hellman algorithm , the RSA encryption algorithm , and Fortezza. E. Digital Signatures and Certificates Relate the use of digital signatures and digital certificates to public key encryption. Define hash key. Further explain digital certificates defining the terms certificate authority (CA) and web of trust. F. Toward a Public Key Infrastructure (PKA) Describe why a public key infrastructure (PKI) is important, yet is slow in development. Discuss some of the issues surrounding the adoption of a public key infrastructure. List and describe the three alternatives to PKI being proposed by U.S. government agencies: the Clipper Chip shown in Figure 12.12 which uses a back door , the key escrow plan proposed by the Clinton administration, and a new back door-based system called key recovery. Web Link : Students can learn more about cryptography issues by visiting the Web site www.cdt.org/crypto. Class Exercise : Refer to the Currents section “Navajo Code Talkers.” The following questions may be posed to lead students in a discussion about the Navajo code talkers:

  1. Do you think there are any spoken languages today that could serve the same function as the Navajo language in 1942?
  2. Do you think computer message encryption will stand the test of time? Why or why not?
  3. The Navajo code talkers could only protect messages during transmission. Discuss the ways a computer message might be captured or compromised before or after the encryption/decryption cycle. G. Public Security Issues of Strong Encryption Discuss export restrictions that are in place surrounding encryption algorithms and the reasons for their existence. Class Exercise : In the aftermath of September 11, 2001, there were calls in the U.S. Congress to outlaw public key encryption. Prior to that, Louis J. Freeh, Director of the FBI, said the honest

Chapter 12 Lecture Notes

have nothing to hide, and only criminals would use encryption. Lead the class in a discussion of the implications of this statement. Describe the Clipper Chip, key escrow plan and key recovery alternatives to public key encryption proposed by U.S. government agencies. H. The Academic Angle Explain the copyright management infrastructure (CMI) and the Digital Millennium Copyright Act (DMCA). Web Link : For current information about the field of cryptographic research, encourage students to visit The International Association of Cryptographic Research (www.iacr.org/). Describe the situation of encryption technologies outside of the United States. Class Exercise : Refer students to the Impacts section “Is the Government Watching You?” The following questions may be posed to lead students in a discussion of Echelon:

  1. Do you think Echelon or something similar exists? Make arguments for and against its existence.
  2. Should we fear the National Security Agency? Are you concerned about your right to privacy? Are you willing to give up some of your electronic communications privacy so that those who would harm us can be thwarted or caught?
  3. Assume Echelon exists. How will you modify your electronic communications activities? VI. CHAPTER REVIEW CIYF 12. Web Link : Refer students to www.prenhall.com/ciyf2004 for a review of the chapter, to answer the questions, and to complete the exercises and Web research questions. Takeaway Points: Ask students to recall the objectives identified at the beginning of this lesson. Tie the initial objectives with the essential lecture points that met the objectives. Objective : Explain the threat to privacy posed by the sale of sensitive personal information on the Internet. Because the United States has no comprehensive Federal regulations protecting an individual’s privacy, highly sensitive personal information, such as Social Security numbers, is now for sale on the Internet. Many Web sites collect personal information without informing their visitors. Objective : Define anonymity and discuss how it can be abused. Anonymity refers to the ability to convey a message without disclosing one’s name or identity. We hold anonymity as a personal freedom in the United States, but anonymity may free people from accountability, and they may abuse the privilege of anonymous speech. Using the cloak of anonymity, someone may injure another’s reputation by making false and malicious statements. Anonymous communications can also be used to threaten and harass, or to spread false and misleading information.