110 likes | 277 Vues
ENGRI 1280: Security, Privacy, and Information Network Design: Wiretaps to Facebook. Steve Wicker Cornell University. Wiretaps to Facebook. One of several “Intro to Engineering” courses College of Engineering freshmen must take one
E N D
ENGRI 1280:Security, Privacy, and Information Network Design: Wiretaps to Facebook Steve Wicker Cornell University TRUST Autumn 2011 Conference
Wiretaps to Facebook • One of several “Intro to Engineering” courses • College of Engineering freshmen must take one • Designed to entice freshmen to affiliate with ECE, CS, or Information Science • Three Modules • Info Networking Technology • Security • Privacy • Currently being taught for the second time. TRUST Autumn 2011 Conference
Course Materials • Journal and newspaper articles • Text (in development) • Guest lectures TRUST Autumn 2011 Conference
Technology Module • Information Networking Technology • 3G and 4G Cellular • Voice/Data/Everything else Convergence • Centralized Architecture • WiFi • Internet • TCP/IP • End to End Design • Voice over IP TRUST Autumn 2011 Conference
Security Module • Information Security and Cryptology • Symmetric and Asymmetric Key Cryptography • PKIs • The Trusted Platform Module • Zero-Knowledge Proofs and Anonymous Authentication • National Crypto Policy TRUST Autumn 2011 Conference
Network Security • Private Computing though Cryptography • Key Distribution Schemes • Remote Attestation in Distributed Systems TRUST Autumn 2011 Conference
Privacy Module • Information Privacy • Definitions of Privacy • Why Should We Care? • The Societal Impact of Privacy Invasion • Privacy and Security on Social Networking Sites TRUST Autumn 2011 Conference
Privacy Law • Technical and Legal History of the Wiretap • Information Content vs. Context • The Electronic Communication Privacy Act • CALEA and VoIP TRUST Autumn 2011 Conference
Privacy-Enhancing Technologies • Privacy-Aware Design Practices • Behavioral Economics and Technologies that “Nudge” • Student Project TRUST Autumn 2011 Conference
The Course Project • Students select a networked technology and explore how it might be used as a surveillance technology. • They apply privacy-aware design practices to re-design the system to make it more privacy-friendly. • Suggested technologies: • cellular networks, smart meters for power consumption monitoring, and wireless Internet services. TRUST Autumn 2011 Conference
Examples from 2010 • Privacy-Aware Design of Web Browsers and Websites • Taking Back Locational Privacy • Privacy-aware RFIDs TRUST Autumn 2011 Conference