Security

8/31/99


Click here to start


Table of Contents

Security

Agenda

Two Types of Social Issues

Computing for Social Processes

Limiting the Use of Computing/IT

Techniques for Limiting Use

Anonymity

Nettiquite

Computing/IT as a Social Process

Ownership

Identity

Authentication

Good Passwords

Integrity

Privacy

Encryption

Cookies

Copyright

Access Control Issues

Denial of Service Attacks

Policy Solutions

Crisis Management

Complex System Issues

Social and Economic Impact

Midterm Structure

Midter Advice

Questions

Download presentation source

Download rich text format outline