Final0001 - NYU Computer Science Department

Download Report

Transcript Final0001 - NYU Computer Science Department

Final review
Our final exam will be held on
Wednesday, May 3rd from 4:00 to
5:50 in room 109 WWH
Final format (same as midterm)
• Part 1: multiple choice
• Part 2: written
– some shorter answers (1 – 3 sentences)
– 1 longer question (perhaps a page)
material
• Basically anything discussed in class or on the
website is fair game.
– Nothing Bergen covered
• More specifically…
Code
• Parts 1 and 2 of the Lessig book
• REGULABILITY
–
–
–
–
–
Chapter
Chapter
Chapter
Chapter
Chapter
1: Code is Law
2: Four Puzzles from Cyberspace
3: Is-ism
4: Architectures of Control
5: Regulating Code
• CODE AND OTHER REGULATORS
– Chapter 6: Cyber-spaces
– Chapter 7: What Things Regulate
Topics in the News
•
•
•
•
•
•
•
Net neutrality
Aol, Yahoo, Goodmail
Patriot Act
Google in China
Search engine data
Broadcast flag / audio flag
Data mining
Networking
•
•
•
•
•
•
•
Arpa: arpanet
Internet
Circuit switching vs. packet switching
Broadband
IP address
DNS
protocol
Privacy
•
•
•
•
•
•
•
•
•
•
Anything from the notes
What is it? Why is it good? Why is it bad?
Third Amendment
Public vs private information – how do you disclose your
private information?
Cookies
Credentials
Government records
National Crime Information Center
Code of Fair Information Practices
Privacy Act of 1974
Privacy (cont)
•
•
•
•
•
•
•
•
•
•
Covert surveillance
Wiretaps and bugs
Shamrock
Fourth Amendment
Patriot Act
TIA
Data mining
Two parties of a transaction
Encryption
Computers are not necessary for an invasion of privacy
but they make old threats more potent.
Organizations
•
•
•
•
•
•
EFF
DARPA
ICANN
Verisign
ACM
NSA
Computer Crime
•
•
•
•
•
•
Identity Theft
Social security numbers
Real ID Act
Viruses Worms Trojan Horses
Phreaks and Hackers
Denial of Service attacks
Computer Reliability
• Data-Entry / Data Retrieval errors
• NCIC (National Crime Information Center)
– March 2003 (arguments on both sides)
• Software and Billing errors
• Software Engineering
– Specification
– Development
– Validation (testing)
• Software Warranties
Guest lecture material
• Copyrights
– Original intent of founding fathers:
• Section 8 (The Powers Clauses)
congress shall have the power to
• Clause 8: To promote the progress of science and useful
arts, by securing for limited times to authors and inventors
the exclusive right to their respective writings and
discoveries;
–
–
–
–
–
–
–
What it has morphed into
Who owns copyright?
Fair use
Public domain
DCMA (Digital Millennium Copyright Act)
Patents
licenses
Guest lecture material
• Free Software
– Free Software and Open Source Software are
typically:
•
•
•
•
•
•
Copyrighted
With a license allowing copying
Copying for personal use with no restrictions of any kind at all
Redistribution of original software with sources
Redistribution of derived works with full sources
Derived works must be Free Software
– GPL (General Public License)
Guest lecture: electronic voting
•
Electronic Voting
–
Machine types
•
•
•
–
Rating the systems
•
•
•
•
–
Credibility
Privacy
Change outcome of an election
Catalog attacks (which is most important)
•
•
•
•
–
Security
Usability
Accessibility
Cost
Threats
•
•
•
–
DRE (direct-recording electronic)
DRE w/ VVPT (Voter Verified Paper audit Trail)
PCOS (Precinct Counted Optical Scan )
$
Time
Informed Participants
Insiders
Findings
•
•
•
•
•
•
•
•
All three system vulnerable
Vulnerabilities can be remedied
Not currently being remedied
Software Attacks Least Difficult
Parallel Testing Helpful, Problematic
Transparent Randomness Key
Wireless Systems Present Problems
Effective Procedures For Addressing Evidence of Fraud Key
Guest lecture material
• Journalism
– Citizen journalism
– Blogs
• Outsourcing
– What it is?
– Benefits
– Costs
• Creative Commons
– Do for culture what the GPL did for software
– Licenses
•
•
•
•
Attribution
Noncommercial
No Derivative Works
Share Alike