engri 1280: security, privacy, and information network design: wiretaps to facebook
DESCRIPTION
ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook. Steve Wicker Cornell University. Wiretaps to Facebook. One of several “Intro to Engineering” courses College of Engineering freshmen must take one - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/1.jpg)
Steve WickerCornell University
1TRUST Autumn 2011 Conference
![Page 2: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/2.jpg)
One of several “Intro to Engineering” courses◦ College of Engineering freshmen must take one◦ Designed to entice freshmen to affiliate with ECE,
CS, or Information Science
Three Modules◦ Info Networking Technology◦ Security◦ Privacy
Currently being taught for the second time.
TRUST Autumn 2011 Conference 2
![Page 3: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/3.jpg)
Journal and newspaper articles Text (in development) Guest lectures
TRUST Autumn 2011 Conference 3
![Page 4: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/4.jpg)
Information Networking Technology◦ 3G and 4G Cellular
Voice/Data/Everything else Convergence Centralized Architecture
◦ WiFi◦ Internet
TCP/IP End to End Design
◦ Voice over IP
TRUST Autumn 2011 Conference 4
![Page 5: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/5.jpg)
Information Security and Cryptology◦ Symmetric and Asymmetric Key Cryptography
PKIs◦ The Trusted Platform Module◦ Zero-Knowledge Proofs and Anonymous
Authentication◦ National Crypto Policy
TRUST Autumn 2011 Conference 5
Encryption DecryptionUnsecure Channel
Secure Channel
User A
KeyGenerator
User B
Encryption DecryptionUnsecure Channel
Public Encryption Key
Private Decryption Key
PC Driven KeyGeneration
Unsecure Channel
User A User B
![Page 6: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/6.jpg)
Network Security◦ Private Computing though Cryptography◦ Key Distribution Schemes◦ Remote Attestation in Distributed Systems
TRUST Autumn 2011 Conference 6
![Page 7: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/7.jpg)
Information Privacy◦ Definitions of Privacy◦ Why Should We Care?◦ The Societal Impact of Privacy Invasion◦ Privacy and Security on Social Networking
Sites
TRUST Autumn 2011 Conference 7
![Page 8: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/8.jpg)
Privacy Law◦ Technical and Legal History of the Wiretap◦ Information Content vs. Context◦ The Electronic Communication Privacy Act◦ CALEA and VoIP
TRUST Autumn 2011 Conference 8
![Page 9: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/9.jpg)
Privacy-Aware Design Practices Behavioral Economics and Technologies
that “Nudge” Student Project
TRUST Autumn 2011 Conference 9
![Page 10: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/10.jpg)
Students select a networked technology and explore how it might be used as a surveillance technology.
They apply privacy-aware design practices to re-design the system to make it more privacy-friendly.
Suggested technologies: ◦ cellular networks, smart meters for power
consumption monitoring, and wireless Internet services.
TRUST Autumn 2011 Conference 10
![Page 11: ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook](https://reader035.vdocument.in/reader035/viewer/2022081421/56814627550346895db33440/html5/thumbnails/11.jpg)
Privacy-Aware Design of Web Browsers and Websites
Taking Back Locational Privacy
Privacy-aware RFIDs
TRUST Autumn 2011 Conference 11