1 / 25

Privacy Requires Security, Not Abstinence: Protecting an Inalienable Right in the Age of Facebook

Delve into the interconnected world of privacy and security, questioning the balance in the age of technology giants like Facebook. Explore historical and modern implications of privacy rights, the impact of data storage, and government surveillance post-9/11. Learn about cybersecurity measures against data theft, insider threats, and the evolving landscape of cyber warfare. Grasp the importance of investing in robust security systems to safeguard sensitive information and uphold individual privacy. Engage with thought-provoking discussions on the fine line between security measures and privacy rights.

rashad
Download Presentation

Privacy Requires Security, Not Abstinence: Protecting an Inalienable Right in the Age of Facebook

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Privacy Requires Security, Not Abstinence: Protecting an Inalienable Right in the Age of Facebook Article by Simon Garfinkel Presentation by Adam Miller

  2. The Constitution • There are no laws specifically stating the right to privacy • Amendments imply privacy rights • Third, Fourth, and Fifth Amendments (Restriction of soldiers being quartered in homes, unreasonable search and seizures, and being a witness against yourself, respectively) • The Computer • Consumer data banks • Computers made it easier to store vast amounts of personal data (credit agencies) • Concerns that data would be misused or errors in the data would negatively impact a person’s life without his or her knowledge of the data being kept about them

  3. Computer (cont.) • Govt. developed Code of Fair Information Practice • Straight forward code; no secret data banks, individuals must be able to view their records, must have a way to correct errors, and data banks must be reliable and secure • The Internet • All activity on the Internet is mediated • Companies could use information stored for financial gain • Federal Trade Commission prevents businesses from using or selling your information by writing “privacy policies”

  4. Life after 9/11 • Raised the question: Privacy or Security? • Total (Terrorist) Information Awareness • Used advances in technology to attempt to catch terrorists before they attack • Congress shut down organization because it treated everyone as a suspect • Facebook • When using Facebook applications, the user is asked to “Allow access?” • How much information is being pulled by the app? • By agreeing, you are saying you trust the app and Facebook’s security and privacy controls

  5. Where We Are Now • Data theft by insiders can be solved • Paying employees enough • Auditing their work • Limiting authority • Harshly punishing those who abuse employer’s trust • Answering the question of Security or Privacy • The problem isn’t that the information is out there, it’s that it isn’t secure • Spending now on better security in systems will prevent having to spend a lot more when faulty security is breached

  6. Questions • The Constitution explicitly states your right to privacy. True or False? False • Which of these is NOT a way to prevent data theft by insiders? • A: Having employees keep data on personal storage devices • B: Auditing employee work • C: Paying them enough • D: Limiting the authority of any one employee Answer: A

  7. A Growing Watch List By Shawn McSweeney • TIDE (Terrorist Identities Datamart Environment • Stores intelligence information (field reports, captured documents, foreign ally news, data about individuals) that government feels could harm US • Exponential Growth (100,000 files in 03; 435,000 now)

  8. Issues • Half of triggered names in 04 and 05 were misidentified (10 of thousands in total) • Cat Stevens Story • Security Issues

  9. Questions • Roughly how many pieces of data does TIDE currently store? • A. 100,000 • B. 435,000 • C. 755,000 • D. 2.3 Million • A quarter of the triggered watch list names were misidentified.

  10. The Software Wars By Stephanie Moore “People often claim that one of every three large-scale software systems gets canceled mid-project. Of those that do make it out the door, three-quarters are never implemented: some do not work as intended; others are just shelved.”

  11. Why you can’t understand your computer! • Common Mistakes in Software Creation • “Metaphysical Absence” • Unreachable deadlines • Shortages of “can-do” attitudes

  12. Suggestions for Future Software Inventors • Obtain the correct tools • Keep it simple • Don’t stifle creativity!

  13. 1. The nonexistence of abstract thought is known as:a. technical confusinonb. metaphysical absence c. daydreamingd. psychological absence • Questions Answer: B 2. Setting unreachable goals will motivate employees to give their best efforts.True or False? Answer: False

  14. The Evolution of Cyber Warfare Presentation by: KhaingOo By Greg Bruno

  15. Cyber Warfare • Spring of 2007, Russia • Estonian monument was moved by the Red Army from capital city to the outskirt of town • Bogus Requests-Requests for information from computers around the world • Banks, Media Outlets, and Ministries were hacked • Most publicized hack in recent history

  16. China • Most active for hacking computers • Washington accused China of hacking into government computer networks • June 2007-Hacked into Pentagon Network • Suspected of hacking in Britain, France, Germany, South Korea, and Taiwan • Russian and China both denied the accusations.

  17. U.S. Cyber Warfare • William Arkin, Defense Analyst • “Our abilities to penetrate into enemy computer networks, our ability to exploit communication networks, to manipulate digital information, is real.” • U.S. has technologies capable of penetrating and jamming enemy networks

  18. Cyber-Warfare Tactics • Request information while masking the location of primary attacker • Use of malware, spyware, and other programs to steal information without user’s knowledge • Cyber attacks aimed at critical infrastructure-less common, but more serious and damaging • Nuclear Power Plant Control Systems • Banks and Subways

  19. Patching the Hole • Until recently, U.S. government did not emphasize on safety from cyber attacks • Difficulty in finding the cyber threat • This is getting more serious and more time demanding • U.S. is a big target • Cyber attacks on the U.S. economy may be the worst case • U.S. claimed that their systems are secure and safe

  20. Review Questions • What country is mostly blame for cyber attacks? • TRUE or FALSE: U.S. have technologies capable of penetrating and jamming enemy networks?

  21. Geeks and Hackers, Uncle Sam’s Cyber Force Wants you! • Article by William J. Astore • Presentation by Raphael Martinez

  22. “Above All vision” • Full spectrum dominance • Air Force stated goal: gain control and access to any and all networked computers • Contractor bids: “dominant cyber offensive engagement” • Headquarters throughout United States • Surveys and propaganda

  23. Ugly Babies and Air Force Computer Systems • Uncertain technical benefits • Inflated prices • SPADOC (ugly baby)-updated computer system • Air Force Mission Support System- Pilots planning missions with latest technology • Out dated and Basic Disaster

  24. Loving Big “Cyber” Brother • Total Dominance isn’t realistic • Too Expensive • Day late and Billion Dollars short

  25. Questions • The goal of the Air Force is to gain control and access to any and all networked computers. T or F? • True • Air Force computer systems are relatively inexpensive and cost-efficient. T or F? • False

More Related