1 / 11

ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook

ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook. Steve Wicker Cornell University. Wiretaps to Facebook. One of several “Intro to Engineering” courses College of Engineering freshmen must take one

aulii
Download Presentation

ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ENGRI 1280:Security, Privacy, and Information Network Design: Wiretaps to Facebook Steve Wicker Cornell University TRUST Autumn 2011 Conference

  2. Wiretaps to Facebook • One of several “Intro to Engineering” courses • College of Engineering freshmen must take one • Designed to entice freshmen to affiliate with ECE, CS, or Information Science • Three Modules • Info Networking Technology • Security • Privacy • Currently being taught for the second time. TRUST Autumn 2011 Conference

  3. Course Materials • Journal and newspaper articles • Text (in development) • Guest lectures TRUST Autumn 2011 Conference

  4. Technology Module • Information Networking Technology • 3G and 4G Cellular • Voice/Data/Everything else Convergence • Centralized Architecture • WiFi • Internet • TCP/IP • End to End Design • Voice over IP TRUST Autumn 2011 Conference

  5. Security Module • Information Security and Cryptology • Symmetric and Asymmetric Key Cryptography • PKIs • The Trusted Platform Module • Zero-Knowledge Proofs and Anonymous Authentication • National Crypto Policy TRUST Autumn 2011 Conference

  6. Network Security • Private Computing though Cryptography • Key Distribution Schemes • Remote Attestation in Distributed Systems TRUST Autumn 2011 Conference

  7. Privacy Module • Information Privacy • Definitions of Privacy • Why Should We Care? • The Societal Impact of Privacy Invasion • Privacy and Security on Social Networking Sites TRUST Autumn 2011 Conference

  8. Privacy Law • Technical and Legal History of the Wiretap • Information Content vs. Context • The Electronic Communication Privacy Act • CALEA and VoIP TRUST Autumn 2011 Conference

  9. Privacy-Enhancing Technologies • Privacy-Aware Design Practices • Behavioral Economics and Technologies that “Nudge” • Student Project TRUST Autumn 2011 Conference

  10. The Course Project • Students select a networked technology and explore how it might be used as a surveillance technology. • They apply privacy-aware design practices to re-design the system to make it more privacy-friendly. • Suggested technologies: • cellular networks, smart meters for power consumption monitoring, and wireless Internet services. TRUST Autumn 2011 Conference

  11. Examples from 2010 • Privacy-Aware Design of Web Browsers and Websites • Taking Back Locational Privacy • Privacy-aware RFIDs TRUST Autumn 2011 Conference

More Related