cybercivics august 18, 2008
DESCRIPTION
CyberCivics August 18, 2008. What is CyberCivics?. Study of contemporary social and political issues that grow out of computer-science related technologies Examples : Privacy of digital communications, electronic voting, data mining, digital surveillance, digital rights management, and more - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/1.jpg)
-1
CyberCivics
August 18, 2008
![Page 2: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/2.jpg)
What is CyberCivics?
Study of contemporary social and political issues that grow out of computer-science related technologies Examples: Privacy of digital communications,
electronic voting, data mining, digital surveillance, digital rights management, and more
Being an engaged citizen of the modern world requires an understanding of computing technologies
![Page 3: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/3.jpg)
-3
Evaluate proposed uses of technology Citizens must consider proposed uses of
technology Should we replace paper ballots with
electronic voting systems? Should we have a national identification
card? Should it have an RFID tag? Should public records be available online? Should emails be admissible evidence in
court? Difficult to weigh the issues without
understanding the technologies themselves, right?
![Page 4: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/4.jpg)
-4
Watch for impact of technology on our rights Citizens should know how technology
impacts their traditional rights Examples?
Do we have a right to sell our copy of a movie if we no longer want it?
Do we have a right to know when our files/emails are searched? If they are stored in our home? at our Internet service provider?
Do we have a right to understand/investigate the process through which our votes are counted?
![Page 5: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/5.jpg)
-5
Shape our society for the better Citizens need to advocate for regulations
that control misuse of technology Do we want a world where
Where companies track and sell private information about individuals?
Someone’s web browsing and media consumption habits are linked to their credit report?
Where people’s location is tracked at all times? Technology easily enable these abuses
Do companies or the government have vested interest in preventing them?
![Page 6: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/6.jpg)
-6
CyberCivics = Contemporary Issues + Hands-on Computer Science Curricula that discusses contemporary issues
and engages students in hands-on activities that help them better understand emerging technologies Computer networking Programming Databases
Dual benefits Be a more informed citizen Gain skills that prepare them for high-tech careers
![Page 7: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/7.jpg)
Institute Overview
Day 1: Overview of CyberCivics, Network Security and Privacy
Day 2: Database PrivacyDay 3: RFID and SurveillanceDay 4: Electronic VotingDay 5: Computer Science Careers,
Lesson Planning and Tools Overview
![Page 8: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/8.jpg)
-8
Activities
Network tracing and analysis Wireless network configuration Writing database queries Writing simple computer programs Analyzing a “hacked” computer
program for vulnerabilities Along the way
Discussions, readings, films, useful web sites, useful tools
![Page 9: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/9.jpg)
-9
Deliverables
Each day, you take notes about what you think would work in your classroom Turn in notes and 1 page comments days 2-5
Write a “citizen’s response” What will you take away personally as a
citizen? Day 5
In teams write plan for lesson segment including a hands-on computer science activity
Give 10 minute demonstration of your lesson segment
![Page 10: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/10.jpg)
-10
Two Activities to Highlight Two Pieces of CyberCivics
Headline search Fake Email
![Page 11: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/11.jpg)
-11
Headline search
![Page 12: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/12.jpg)
-12
Headlines
Veterans Administration Loses Data on 1.8 million-- Consumer Affairs, 2/13/07
Sony BMG Hacking into CD Buyers’ Computers-- FOX News, 11/3/05
Audit Finds Many Faults in Cleveland’s ’06 Voting-- NY Times, 4/20/07
Machines Record Votes Inaccurately in Tests-- Dayton Daily News, 3/20/07
Experts: Wi-Fi Eavesdropping Persists…-- Boston Globe, 8/7/07
![Page 13: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/13.jpg)
-13
Fake Email
![Page 14: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/14.jpg)
-14
Protocol
If two people are going to communicate, they must agree on a language
Protocol = language defining the expected order and meaning of messages they exchange. Hi …Hi…Got the time?….two oclock
SUCCESSFUL EXCHANGE Hi…Don’t bother meXX ABORTED Allo…
Hello..Quelle heuere a’til …..XX<blank stare> MISMATCH
![Page 15: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/15.jpg)
-15
Layered Architectures
Human beings are able to handle lots of complexity in their language processing. Ambiguously defined Many interactions all at once
How do computers manage complex protocol processing? Specify well defined protocols to enact. Decompose complicated jobs into layers
that each have a well defined task
![Page 16: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/16.jpg)
-16
Layered Architectures
Break-up big job into smaller, more manageable jobs.
Different entity does each job
![Page 17: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/17.jpg)
-17
Physical Mail
Assistant X
Secretary X
Mailroom X
Post Office X
CEO X
Assistant Y
Secretary Y
Mailroom Y
Post Office Y
CEO YLunch?
Schedule?
Important Note?
Internal mail info
External mail info
![Page 18: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/18.jpg)
-18
Physical Mail
Assistant X
Secretary X
Mailroom X
Post office X
CEO X
Assistant Y
Secretary Y
Mailroom Y
Post office Y
CEO Y“Lunch?”
“Lunch?”
“Lunch?”
“Lunch?”
“Lunch?”
![Page 19: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/19.jpg)
-19
Envelopes Exercise
![Page 20: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/20.jpg)
-20
Layered Architectures
Break-up big job into smaller, more manageable jobs.
Different entity does each job
![Page 21: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/21.jpg)
-21
Computer Networking
Web browser
TCP server
IP server
ethernetdriver/card
user X
HTTP
TCP
IP
Web server
TCP server
IP server
ethernetdriver/card
user Y
IEEE 802.3 standard
electric signals
English (?)
![Page 22: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/22.jpg)
-22
Computer Networking
Web browser
TCP server
IP server
ethernetdriver/card
user X, wants page
Web server
TCP server
IP server
ethernetdriver/card
user Y, posted pageGet page
Get page
Get page
Get page
Get page
![Page 23: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/23.jpg)
-23
First Look At Wireshark
Capturing Get a web page Look At One Package Look At One Conversation
![Page 24: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/24.jpg)
-24
One more complication
Assistant
Secretary
Mailroom
outgoing
CEO A
Post office
in out
Assistant
Secretary
Mailroom
incoming
CEO B
Post office
outin
![Page 25: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/25.jpg)
-25
Computer Networking
HTTP
TCP
IP
ethernet
Host A
IP
ethernet
Router R
link
HTTP
TCP
IP
ethernet
Router W
Host B
IP
ethernetlink
![Page 26: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/26.jpg)
-26
Traceroute/tracert
![Page 27: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/27.jpg)
-27
Graphical Traceroute (plus DNS information )
![Page 28: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/28.jpg)
-28
Another Look At Wireshark
http vs https Pop
![Page 29: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/29.jpg)
-29
Trace Your Own
Rules for tracing Answer questions Discussion of privacy concerns
![Page 30: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/30.jpg)
-30
Know your network neighborhood Hubs vs Switchs Do you trust the administrator?
![Page 31: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/31.jpg)
-31
Wireless networks
![Page 32: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/32.jpg)
-32
Outtakes
![Page 33: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/33.jpg)
Day 1: Overview and NetworksOverview of CyberCivicsHands-on exercises with open source
network protocol analysis software Hands-on exercises illustrating the
weaknesses of typical wireless network configurations
Network communication in the headlines
![Page 34: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/34.jpg)
Day 2: Database Privacy
Readings on data mining and privacyHands-on exercises writing simple
database queriesHands-on exercises with inference
control and database privacyDocumentary: “No More Privacy, All
About You”Database privacy in the headlines
![Page 35: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/35.jpg)
Day 3: RFID and SurveillanceReadings on RFID, video surveillance,
and REAL-IDHands-on exercises with RFID
experiment kitsRFID and surveillance in the headlines Documentary: “Hacking Democracy”
(preparation for Day 4)
![Page 36: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/36.jpg)
Day 4: Electronic Voting
Readings on electronic voting Hands-on exercises with Python
programmingHands-on exercise reading source code
for electronic voting system and running mock election
Electronic voting in the headlines
![Page 37: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/37.jpg)
Day 5: CS Careers, Lesson Planning and ToolsExploration of on-line Occupational
Outlook HandbookHands-on exercises with CyberCivics
tools and “kits” (virtual machines, LiveCDs)
Lesson planning activity and feedback
![Page 38: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/38.jpg)
Kits Materials budget to provision “kits” that
teachers can check out and use Kits will include
CDs with virtual machine images and LiveCDs Collections of readings (loose leaf for ease of copying) Hardware such as wireless access points and RFID kits Copies of relevant DVDs and books
On-line “kit” supplements will contain downloadable files, pointers to on-line resources including where to buy materials, etc.
![Page 39: CyberCivics August 18, 2008](https://reader035.vdocument.in/reader035/viewer/2022062423/56814b32550346895db83d1e/html5/thumbnails/39.jpg)
-39