One of several “Intro to Engineering” courses◦ College of Engineering freshmen must take one◦ Designed to entice freshmen to affiliate with ECE,
CS, or Information Science
Three Modules◦ Info Networking Technology◦ Security◦ Privacy
Currently being taught for the second time.
TRUST Autumn 2011 Conference 2
Information Networking Technology◦ 3G and 4G Cellular
Voice/Data/Everything else Convergence Centralized Architecture
◦ WiFi◦ Internet
TCP/IP End to End Design
◦ Voice over IP
TRUST Autumn 2011 Conference 4
Information Security and Cryptology◦ Symmetric and Asymmetric Key Cryptography
PKIs◦ The Trusted Platform Module◦ Zero-Knowledge Proofs and Anonymous
Authentication◦ National Crypto Policy
TRUST Autumn 2011 Conference 5
Encryption DecryptionUnsecure Channel
Secure Channel
User A
KeyGenerator
User B
Encryption DecryptionUnsecure Channel
Public Encryption Key
Private Decryption Key
PC Driven KeyGeneration
Unsecure Channel
User A User B
Network Security◦ Private Computing though Cryptography◦ Key Distribution Schemes◦ Remote Attestation in Distributed Systems
TRUST Autumn 2011 Conference 6
Information Privacy◦ Definitions of Privacy◦ Why Should We Care?◦ The Societal Impact of Privacy Invasion◦ Privacy and Security on Social Networking
Sites
TRUST Autumn 2011 Conference 7
Privacy Law◦ Technical and Legal History of the Wiretap◦ Information Content vs. Context◦ The Electronic Communication Privacy Act◦ CALEA and VoIP
TRUST Autumn 2011 Conference 8
Privacy-Aware Design Practices Behavioral Economics and Technologies
that “Nudge” Student Project
TRUST Autumn 2011 Conference 9
Students select a networked technology and explore how it might be used as a surveillance technology.
They apply privacy-aware design practices to re-design the system to make it more privacy-friendly.
Suggested technologies: ◦ cellular networks, smart meters for power
consumption monitoring, and wireless Internet services.
TRUST Autumn 2011 Conference 10