STP 301: Privacy and Security
16: Why Securing Digital is Distinct
9: Shopping Day
Reading: Goals, guides and tools for
STP 301 for Fall 2003
If you choose to take the class give me your name and I will
ensure you have access to the class web page. Readings are
frequently available only on the course page to avoid packet
11: How Big? SoBig
18: Economic Perspectives on Computer Security
Sept. 23: War on the
- Denning, Information Warfare
Chapter 1, "The Gulf War: Infowar " pp. 1 -19.
and the power of TV hackivists in the Iraq war.
- Defense Information System
Network Attack Anonymous Maximum Security pp. 89.
- After a two year hiatus CIAO has
become active in the Bush Administration as part of the Homeland
Security Department. The
National Cyberspace Strategy
Determining the truth about
hacking attacks: FUD vs. reality
interview with Ehud Tenebaum pp.87, anonymous
critical examination of the interview.
- Other media links
Terror on the Network
Guest Lecture by Jessica Stern
Web defacement: Anatomy of an Attack
- Cliff Stoll Cuckoo's Egg
pp. 218 - 239. Author: copyright 1990.Pocket Books (New York)
- Vince Tuesday, Anatomy of an Attack: A Race Against Time.
Computerworld; 3/19/2001, Vol. 35 Issue 12, p. 57. Available on
Oct. 2: Voting, or Who Won
the Georgia Senate Election
Guest lecture by Rebecca Mercuri
7: Trusted Computing
Polling," Rebecca Mercuri, Inside Risks, Communications of
the Association for Computing Machinery, Volume 36, No. 11,
Business of Elections," Rebecca Mercuri, 3rd Conference on
Computers, Freedom and Privacy, March, 1993.
9: Trusted Computing -- Trusted by Whom?
14: What is Privacy: Privacy vs Data Protection
16: Emerging Issues in Privacy 1: RFID
- L. Jean Camp, "Design for Trust " Trust,
Reputation and Security: Theories and Practice, ed. Rino Falcone:
Springer-Verlang (Berlin) Spring 2003.
- In class: what is data protection.
21: Emerging Issues in Privacy 2: TIA
23: Privacy on the Wire: what is wire-tapping?
28: Technical Risks in Surveillance Technologies
- "Listening in In" by
Stephen Cass, IEEE Spectrum Special Report on Intelligence and
Technology, Vol. 40, No 4, pp. 32 -37.
- "Getting the Message "
by Paul Wallich,IEEE Spectrum Special Report on Intelligence and
Technology, Vol. 40, No 4, pp 38-43.
an international digital global surveillance tool.
30: Risks in Surveillance Technologies
- Anderson, Abelson, Bellovin,
Benaloh, Blaze, Diffie Gilmore, Neumann, Rivest, Schiller, &
Schneier The Risks Of
Key Recovery, Key Escrow, and Trusted Third Parties", 1998
Technical Review of the Carnivore System
- Bellovin, Blaze, Farber, Neumann,
on Carnivore System Technical Review December, 2000. SRI.
- Neumann, P. G., 1993, "Risks
of surveillance", Communications of the ACM, v. 36, No. 8, p.
4: What is Cryptography
6: Authentication & Identifiers
- L. Jean Camp "Basic
Cryptography" Chapter 3. You may purchase the book or select
the material from the on-line version. However, if you choose Print
after going to the on-line version Trust
and Risk you will print the entire book.
- Michael Froomkin, "Flood
Control on the Information Ocean," Journal of Law and Commerce
- optional: UETA
focus on the implications digital signatures
18: Human Engineering
20; The Virus Problem
- Ross Anderson, "Why crypto
systems fail", Comm. of the ACM, v. 37, n. 11, Nov. 1994,
- Alma Whitten "Why
Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0"
Alma Whitten, J.D. Tygar 8th USENIX Security Symposium.
- Anonymous Maximum Security
Viruses, pp. 159 - 176.
- Denning, Information Warfare
and Security Chapter 10: Cyberplagues, pp. 269-282.
track of all viruses, scans, and spams generated by Roaring
2: Identity Theft
4: Malware from P2P and Corporate Source
9: Best Practices and Summary
- There is little academic work on
spyware. Therefore the reading is, by necessity, the quality of
example of spyware from QuickFlicks is hard to remove, and
sends all user urls to a remote machine.
- optional: An
entertaining site that includes a listing of all the software
installed to exploit the putative owner of a machine.
- optional: Anti-spyware tools from
recommended for your use.
11: Class Notes
- Discussion of final projects, announcement of winter break
© Jean Camp, 2003.