Class 30: Security and Privacy CSCI 101 Fall 2010 Daniel Scharstein Today Security Social Issues Reliance on computers DRM Privacy Computer Security Physical security : protect from theft, keep data backups, control access with passwords What makes a good password? Why?
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Technological advances ripple through society and raise new ethical and legal issues
Dealing with these issues requires understanding of new technologies and their impact
1. Relying on computers for life-critical systems
2. Ownership and usage of intellectual property
3. Personal privacy
Therac-25 radiation machine (1985–1987)
At least 5 patients died from receiving radiation overdoses
Patriot Missile System (1991)
Roundoff error that accumulated over time rendered system unable to target incoming scuds
Windows 2000 operating system
63,000 bugs in 35,000,000 lines of code
Bugs not considered “critical”
What tasks should we entrust to a computer? Should a computer…
Control a nuclear reactor?
Fly an airplane? (e.g., Boeing vs. Airbus)
Be a psychologist?
Who should be responsible for software mishaps?
Should there be a licensing procedure for software engineers?
Technologies used by publishers or copyright owners to control access to and usage of digital data or hardware
How can we protect the rights of both the producers and consumers of intellectual property?
Data mining is the automated extraction of hidden, predictive information from large databases
Data mining using artificial intelligence and other methods, such as decision trees, neural networks, k-means clustering, and rule induction
Web site personalization
Credit card fraud detection
Market basket analysis
Beer and diapers story
How much info about you is stored on computers?
Who has access to it? Who should?
Should companies be allowed to sell the data they collect about you to other companies?
Should companies be allowed to profile you?
e.g., deciding whether to approve a mortgage application
What if they get inaccurate information about you?
Are you worried about identity theft?