CS 440 Computers, Ethics and Society - PowerPoint PPT Presentation

1 / 22
About This Presentation
Title:

CS 440 Computers, Ethics and Society

Description:

The cartoon that was here came from Randy Glassbergen's 'Cartoon of ... Antonio Wilder. No. Chris Baker. Yancey Bond. Misha Drlikova. Kim Poole. Steven Woods ... – PowerPoint PPT presentation

Number of Views:48
Avg rating:3.0/5.0
Slides: 23
Provided by: Marcus3
Category:

less

Transcript and Presenter's Notes

Title: CS 440 Computers, Ethics and Society


1
CS 440 Computers, Ethics and Society
  • Spring 2000
  • Class 10
  • February 08, 2000

2
Thought for the Day
  • When cryptography is outlawed,
  • bayl bhgynjf jvyy unir cevinpl.

3
Todays Cartoon
  • The cartoon that was here came from Randy
    Glassbergens Cartoon of the Day site.

4
Todays Agenda
  • Finish Baase, chapter 2 Privacy AE 28, 35
  • Baase, Chapter 3 Wiretapping Encryption
  • Select 2 class monitors

5
Reading Assignment
  • Thursday Baase, chapter 4

6
Debate Questions Feb 24
  • Should Digital Signatures be as binding as
    physical signatures (pen paper)?
  • Should anyone be able to write and use a program
    to play DVD disks?
  • Is the loss of privacy due to the FBI NCIC a
    reasonable price to pay for the improvement in
    law enforcement?

7
Debate Teams NCIC
  • Yes
  • Emmanuel Allen
  • Frank Chen
  • Bonita Oliver
  • Mehul Vashi
  • Antonio Wilder
  • No
  • Chris Baker
  • Yancey Bond
  • Misha Drlikova
  • Kim Poole
  • Steven Woods

8
Debate Teams DVD
  • Yes
  • Regina Covington
  • Jennifer Neuman
  • Valerie Paris
  • Eric Trzecki
  • Dan Walsh
  • No
  • Tony Barrile
  • David Chen
  • Crutcher Dunnavant
  • Jenny Tsen
  • Ryan Varga

9
Debate Teams Digital Signatures
  • Yes
  • Hattan Ahmed
  • Dwight Clark
  • George Washington
  • Paul Wideman
  • No
  • James Crownover
  • Josh Sanders
  • Jamey Yarbrough
  • Rondell Warren

10
The EU, the USA and Privacy
  • Whats the background? (AE 35)
  • Whats the current situation?
  • Whats likely to happen?
  • Is there any interest in this by the political
    candidates?
  • Should there be?

11
Privacy The Very Idea
  • What is privacy good for, anyway?
  • Why do we want or need it?
  • Do we need it?
  • Have we always had privacy?

12
Guidelines for information usage
  • Informed consent
  • Opt in/Opt out/ Opt in for each use.
  • Free market view.
  • Consumer protection view.

13
Questions on Privacy
  • What are the restrictions on Alabama drivers
    license information?
  • In 1983, the federal government had an average of
    15 files for each person in the USA! What is it
    like now? What does this mean to our privacy?

14
Questions on Privacy
  • Where in Tuscaloosa (every-day life) is your
    picture taken (video cameras)?
  • Blocking by 'demographic psychographic'
    profiles. What's in a psychographic profile?

15
Group work
  • Baase, page 77

16
Ch 4 Reading Quiz
  • Choose 2 questions
  • Why is cryptography more dangerous than most
    weapons of war?
  • Give one reason why prohibiting the export of
    strong cryptography is not very effective.
  • What is one of the main arguments given by the
    government for wanting access to all encryption
    keys?
  • What is one effect of the U.S. government's
    restrictions on export of strong cryptography?

17
Ch 4 Wiretapping Encryption
  • How common is/was wiretapping?
  • Why does the export ban raise constitutional
    questions?
  • What is so threatening about escrowed keys?
  • Is the Administration still committed to limiting
    strong cryptography?

18
Impromptu Class Debate
  • East side We should use the Clipper chip.
  • West side We should not use it.
  • Think Pair Share
  • List Arguments on each side

19
Public Key Cryptography
  • Public key Private key
  • Cryptographically speaking, they are mirror
    images of each other.
  • Mathematically speaking, you cant produce one
    from the other.
  • What is encrypted with one can only be decrypted
    with the other.

20
Crypto Key Length
  • Each bit doubles the size of the key space.
  • If it takes 100 hours to break a 56 bit key, how
    long will it take to break a 57 bit key?
  • How long did it take EFF to break a 56 bit DES
    key?

21
Using PGP
  • Make a pair of keys.
  • Get your public key signed by someone you trust.
  • Post it somewhere, preferably a key server.
  • Use it to sign all your email.
  • How easy is it to spoof email?

22
Communications Assistance for Law Enforcement Act
of 1994
  • The Bill of Rights was to protect us from who?
  • Key Escrow Can we trust the government?
Write a Comment
User Comments (0)
About PowerShow.com