Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Privacy and Information Technology - Lecture Slides | IS 376, Study notes of Humanities

Material Type: Notes; Class: Information Technology and Society; Subject: Interdisciplinary Studies; University: Southern Illinois University Edwardsville; Term: Unknown 1989;

Typology: Study notes

Pre 2010

Uploaded on 08/16/2009

koofers-user-fye
koofers-user-fye 🇺🇸

10 documents

1 / 17

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Privacy
&
Information Technology
Dr. Stephen Blythe
Department of Computer Science
SIUE
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff

Partial preview of the text

Download Privacy and Information Technology - Lecture Slides | IS 376 and more Study notes Humanities in PDF only on Docsity!

Privacy

Information Technology

Dr. Stephen Blythe Department of Computer Science SIUE

What Is Privacy?

Three key “aspects” everyone wants:

freedom from intrusion

control of personal information freedom from surveillance

Databases

A database (DB) is:

collection of “related” data

that is easy to access quickly

Examples:

credit bureaus (Experian, Equifax, ...)

restaurant reviews

airline reservations (scheduled and completed) survey results

Secondary Use

Use of data in a manner not originally intended

Came about as storage become cheaper and larger

complete works of Shakespeare: ~5 Megabytes(MB)

CD-ROM: ~700 MB

DVD: ~17 Gigabytes (GB)

modern desktop hard drive: ~200 GB

Costs:

100 MB circa 1990: ~$400 (very few utilized) 200 GB today: ~$100 (most PC’s have)

Other Secondary Uses

Cell Phones & Pagers

can be used to locate 911 calls (“tracking”)

Global Positioning Systems (GPS)

automatically guide military jets onto carriers

Microscopic Cameras embedded in cell phones

Database Issues

Inaccurate information can get in databases

false (usually negative) credit reports

denial of boarding on aircraft

Secondary use by criminals (ex. pedophiles) Secondary use by government

Other Privacy Invasions

Satellite Imaging

http://maps.google.com

http://gis.stlouisco.com

these are relatively “lighweight” examples!

Full Body Security X-Rays Closed Circuit Television (CCTV)

Protecting Privacy

One approach is to “let the market fix it”

relies on companies to address issues

a.k.a. “self regulation”

Examples:

mailing list companies renting (not selling)

forcing payment to get survey results re-imbursing for survey participation

Protecting Privacy (cont.)

Watch out for passwords ....

sites may store your password these sites might be hacked

Protecting Privacy (cont.)

Watch out for passwords ....

sites may store your password

these sites might be hacked

stay away from sites that can send you your original password. Why?

they have stored your password in plain text better option is to store a “checksum” password

Checksums

Instead of storing “ ”

store:

no easy way to get original text (password?)

not the greatest checksum in the world ...

gives the same thing

this is known as a “collision”

MD5 checksums (hashes) generate 1024 bits

no immediate “character counts” contained very hard to make a “collision” match

Checksum Uses

store checksum instead of password

now, if password database is hacked ...

all the hacker gets is garbage checksum strings

no easy way to get original text (password)

can certify/verify software this way

manufacturer creates hash of binary software

posts resulting hash (often MD5) to Internet

purchaser then hashes purchased software if hashes match, software is certified/verified