1
|
- Week 13
- LBSC 690
- Information Technology
|
2
|
- Questions
- Ownership
- Identity
- Privacy
- Integrity
|
3
|
- Computing facilities
- Networks
- Speed, continuity, access points
- Information sources
- Per-use fee vs. subscription vs. advertising
- Language
- Skills
- System, access strategies, information use
|
4
|
- Who has the right to use a computer?
- Who establishes this policy?
How?
- What equity considerations are raised?
- Can someone else deny access?
- Denial of service attacks
- How can denial of service be prevented?
- Who can gain access and what can they do?
|
5
|
- Parental control
- Web browsing software, time limits
- Intellectual property protection
- Copyright, trade secrets, privilege
- National security
- Censorship
|
6
|
- Access control
- Copy protection
- Licensing
- Shrinkwrap, shareware, GPL, creative commons
- Digital watermarks
- Provide a basis for prosecution
|
7
|
- Balance two desirable characteristics
- Financial incentives to produce content
- Desirable uses of existing information
- Safe harbor agreement (1976 legislative history)
- Book chapter, magazine article, picture, …
- Developed in an era of physical documents
- Perfect copies/instant delivery alter the balance
|
8
|
- Copyright Term Extension Act (CTEA)
- Ruled constitutional (Jan 2003, Supreme Court)
- Digital Millennium Copyright Act (DMCA)
- Prohibits circumvention of technical measures
- Implements WIPO treaty database protection
|
9
|
- Communications Decency Act (CDA)
- Ruled unconstitutional (1997, Supreme Court)
- Child Online Protection Act (COPA)
- Enforcement blocked (March 2007, 3rd Circuit)
- Children’s Internet Protection Act (CIPA)
- Ruled constitutional (June 2003, Supreme Court)
- Applies only to E-Rate and LSTA funds
|
10
|
- Any individual approach is imperfect
- Term-based techniques
- Recall/precision tradeoff
- Not as useful for audio (e.g., podcasts)
- Image-based techniques
- Whitelists and blacklists
- Expensive to create manually
- Differing opinions, time lag
|
11
|
- Viruses
- Platform dependent
- Typically binary
- Flooding
- Worms
- Zombies
- Chain letters
|
12
|
- Computer programs able to attach to files
- Replicates repeatedly
- Typically without user knowledge or permission
- Sometimes performs malicious acts
|
13
|
- 1988: Less than 10 kno=
wn
viruses
- 1990: New virus found =
every
day
- 1993: 10-30 new viruse=
s per
week
- 1999: 45,000 viruses a=
nd
variants
|
14
|
- Self-reproducing program that sends itself across a network
- Virus is dependent upon the transfer of files
- Worm spreads itself
- SQL slammer worm (January 25, 2003) claimed 75,000 victims within 10
minutes
|
15
|
|
16
|
- Establishing identity permits access control
- What is identity in cyberspace?
- Attribution
- Impersonation
- Forgery is remarkably easy
- Just set up your mailer with bogus name and email
|
17
|
- Used to establish identity
- Two types
- Physical (Keys, badges, cardkeys, thumbprints)
- Electronic (Passwords, digital signatures)
- Protected with social structures
- Report lost keys
- Don’t tell anyone your password
- Use SSH to defeat password sniffers
|
18
|
- Long enough not to be guessed
- Programs can try every combination of 5 letters
- Not in the dictionary
- Programs can try every word in a dictionary
- every proper name, pair of words, date, every …
- Mix upper case, lower case, numbers
- Change it often
- Reuse creates risks
- Abuse, multiple compromise
|
19
|
- Guessing
- Brute force
- Impersonation
- “Phishing”
- Theft
|
20
|
- Protect system administrator access
- Greater potential for damaging acts
- What about nefarious system administrators?
- Firewalls
- Prevent unfamiliar packets from passing through
- Makes it harder for hackers to hurt your system
|
21
|
- Governments have information about life events
- Birth and death
- Marriage and divorce
- Licenses (e.g., drivers)
- Property and taxes
- Business exchange information about transactions
- How you commute to work
- What cereal you eat
- Where you like to go for vacation
- What hobbies you have
|
22
|
- Web tracking
- Browser data, clickthrough, cookies, …
- Packet sniffers
- Detect passwords, reconstruct packets, …
- Law enforcement
- Carnivore (US), RIP (UK), …
- National security
- Echelon (US), SORM (Russia), …
|
23
|
|
24
|
|
25
|
- Serves several purposes
- Sensitive issues on discussion groups
- Brainstorming
- Whistleblowers
- Marketing (“Spam”)
- Common techniques
- Anonymous remailers
- Pseudonyms
|
26
|
- A lot of government-collected information is public record
- Previously shielded by “practical obscurity”
- Records were hard to access
- Not so with the Internet
|
27
|
- Establishing identity permits access control
- Yet people don’t want to be tracked
- How do you provide accountability?
- People’s behavior change when no one is watching
|
28
|
- What privacy rights do computer users have?
- On email?
- When using computers at work?
At school?
- What about your home computer?
- What about data about you?
- In government computers?
- Collected by companies and organizations?
- Does obscurity offer any privacy?
|
29
|
- Privacy Act of 1974
- Applies only to government records
- TrustE certification guidelines
- Site-specific privacy policies
- Federal Trade Commission enforcement
- Organizational monitoring
|
30
|
|
31
|
|
32
|
- Key =3D a large number (> 1024 bits)
- Public key: known by all authorized decoders
- Private key: known only by encoder
- One-way mathematical functions
- “Trapdoor functions”
- Like mixing paint (easy to do, hard to undo)
- Large numbers are easy to multiply, hard to factor
- Importance of longer keys
- Keys < 256 bits can be cracked in a few hours
- Keys > 1024 bits presently effectively unbreakable
|
33
|
- Encryption is a double-edged sword
- The ability to keep secrets facilitates secure commercial transacti=
ons
- But bad guys can use encryption to keep secrets…
- Can be cracked by “authorized parties”?
- How should that ability controlled?
|
34
|
|
35
|
- Malicious program with undesired capabilities
- Log key strokes and sends them somewhere
- Create a “back door” administrator logon
- Spyware: reports information about your activity without your knowle=
dge
- Doesn’t (necessarily) replicate
|
36
|
|
37
|
- USA PATRIOT Act
- Access to business records
- Internet traffic analysis (with a court order)
- Foreign Intelligence Surveillance Act (FISA)
- Secret court for monitoring foreign communications
- Special protections for citizens/permanent residents
|
38
|
- Built-in features of standard software
- Browser history, outgoing email folders, etc.
- “Parental control” logging software
- ChatNANNY, Cyber Snoop, FamilyCAM, …
- Personal firewall software
|
39
|
- Proxy server
- Set up a Web server and enable proxy function
- Configure all browsers to use the proxy server
- Store and analyze Web server log files
- Firewall
- Can monitor all applications, not just the Web
|
40
|
- Scan for files in obscure locations
- Find-by-content for text, ACDSee for pictures, …
- Examine “deleted” disk files
- Decode encrypted files
- Possible for many older schemes
|
41
|
- How do you know what’s there is correct?
- Attribution is invalid if the contents can change
- Access control would be one solution
- Encryption offers an alternative
|
42
|
- Alice “signs” (encrypts) with her private key
- Bob checks (decrypts) with her public key
- Bob knows it was from Alice
- Since only Alice knows Alice’s private key
- Non-repudiation: Alice can’t deny signing message
- Except by claiming her private key was stolen!
- Integrity: Bob can’t change message
- Doesn’t know Alice’s Private Key
|
43
|
- Pubic announcement of public key
- e.g., append public key to the end of each email
- But I can forge the announcement
- Establish a trusted “certificate authority”
- Leverage “web of trust” to authenticate authority
- Register public key with certificate authority
|
44
|
|
45
|
|
46
|
- Establish policies
- Authenticate
- Authorize
- Audit
- Supervise
|
47
|
- Keep anti-virus software current
- Keep software “patches” current
- Change default settings
- Be wary of anything free
|