Powerpoint slides
Download
Report
Transcript Powerpoint slides
CyberCivics
August 18, 2008
-1
What is CyberCivics?
Study of contemporary social and political
issues that grow out of computer-science
related technologies
Examples: Privacy of digital communications,
electronic voting, data mining, digital surveillance,
digital rights management, and more
Being an engaged citizen of the modern world
requires an understanding of computing
technologies
Evaluate proposed uses of
technology
Citizens must consider proposed uses of
technology
Should we replace paper ballots with electronic
voting systems?
Should we have a national identification card?
Should it have an RFID tag?
Should public records be available online?
Should emails be admissible evidence in court?
Difficult to weigh the issues without
understanding the technologies themselves,
right?
-3
Watch for impact of
technology on our rights
Citizens should know how technology impacts
their traditional rights
Examples?
Do we have a right to sell our copy of a movie if we no
longer want it?
Do we have a right to know when our files/emails are
searched? If they are stored in our home? at our
Internet service provider?
Do we have a right to understand/investigate the
process through which our votes are counted?
-4
Shape our society for the
better
Citizens need to advocate for regulations
that control misuse of technology
Do we want a world where
Where companies track and sell private
information about individuals?
Someone’s web browsing and media consumption
habits are linked to their credit report?
Where people’s location is tracked at all times?
Technology easily enable these abuses
Do companies or the government have vested
interest in preventing them?
-5
CyberCivics = Contemporary
Issues + Hands-on Computer
Science
Curricula that discusses contemporary issues and
engages students in hands-on activities that help
them better understand emerging technologies
Computer networking
Programming
Databases
Dual benefits
Be a more informed citizen
Gain skills that prepare them for high-tech careers
-6
Institute Overview
Day 1: Overview of CyberCivics, Network
Security and Privacy
Day 2: Database Privacy
Day 3: RFID and Surveillance
Day 4: Electronic Voting
Day 5: Computer Science Careers, Lesson
Planning and Tools Overview
Activities
Network tracing and analysis
Wireless network configuration
Writing database queries
Writing simple computer programs
Analyzing a “hacked” computer program for
vulnerabilities
Along the way
Discussions, readings, films, useful web sites,
useful tools
-8
Deliverables
Each day, you take notes about what you
think would work in your classroom
Turn in notes and 1 page comments days 2-5
Write a “citizen’s response”
What
will you take away personally as a citizen?
Day 5
In teams write plan for lesson segment
including a hands-on computer science activity
Give 10 minute demonstration of your lesson
segment
-9
Two Activities to Highlight Two Pieces of
CyberCivics
Headline search
Fake Email
-10
Headline search
-11
Headlines
Veterans Administration Loses Data on 1.8 million
-- Consumer Affairs, 2/13/07
Sony BMG Hacking into CD Buyers’ Computers
-- FOX News, 11/3/05
Audit Finds Many Faults in Cleveland’s ’06 Voting
-- NY Times, 4/20/07
Machines Record Votes Inaccurately in Tests
-- Dayton Daily News, 3/20/07
Experts: Wi-Fi Eavesdropping Persists…
-- Boston Globe, 8/7/07
-12
Fake Email
-13
Protocol
If two people are going to communicate,
they must agree on a language
Protocol = language defining the expected
order and meaning of messages they
exchange.
Hi …Hi…Got the time?….two oclock
SUCCESSFUL EXCHANGE
Hi…Don’t bother meXX ABORTED
Allo…Hello..Quelle heuere a’til …..XX<blank
stare> MISMATCH
-14
Layered Architectures
Human beings are able to handle lots of
complexity in their language processing.
Ambiguously defined
Many interactions all at once
How do computers manage complex
protocol processing?
Specify well defined protocols to enact.
Decompose complicated jobs into layers that
each have a well defined task
-15
Layered Architectures
Break-up big job into smaller, more
manageable jobs.
Different entity does each job
-16
Physical Mail
CEO X
Assistant X
Lunch?
Schedule?
CEO Y
Assistant Y
Important Note?
Secretary X
Secretary Y
Internal mail info
Mailroom X
Mailroom Y
External mail info
Post Office X
Post Office Y
-17
Physical Mail
CEO X
“Lunch?”
CEO Y
Assistant X
“Lunch?”
Assistant Y
Secretary X
“Lunch?”
Secretary Y
Mailroom X
“Lunch?”
Mailroom Y
Post office X
“Lunch?”
Post office Y
-18
Envelopes Exercise
-19
Layered Architectures
Break-up big job into smaller, more
manageable jobs.
Different entity does each job
-20
Computer Networking
user X
English (?)
user Y
Web browser
HTTP
Web server
TCP server
TCP
TCP server
IP server
ethernet
driver/card
IP
IEEE 802.3 standard
electric signals
IP server
ethernet
driver/card
-21
Computer Networking
user X, wants page
Get page
user Y, posted page
Web browser
Get page
Web server
TCP server
Get page
TCP server
IP server
Get page
IP server
Get page
ethernet
driver/card
ethernet
driver/card
-22
First Look At Wireshark
Capturing
Get a web page
Look At One Package
Look At One Conversation
-23
One more complication
CEO A
CEO B
Assistant
Assistant
Secretary
Secretary
Mailroom
outgoing
Post office
in
out
Post office
in
out
Mailroom
incoming
-24
Computer Networking
Host A
Host B
Router R
Router W
HTTP
HTTP
TCP
TCP
IP
ethernet
IP
ethernet link
IP
link ethernet
IP
ethernet
-25
Traceroute/tracert
-26
Graphical Traceroute (plus
DNS information )
-27
Another Look At Wireshark
http vs https
Pop
-28
Trace Your Own
Rules for tracing
Answer questions
Discussion of privacy concerns
-29
Know your network
neighborhood
Hubs vs Switchs
Do you trust the administrator?
-30
Wireless networks
-31
Outtakes
-32
Day 1: Overview and Networks
Overview of CyberCivics
Hands-on exercises with open source
network protocol analysis software
Hands-on exercises illustrating the
weaknesses of typical wireless network
configurations
Network communication in the headlines
Day 2: Database Privacy
Readings on data mining and privacy
Hands-on exercises writing simple
database queries
Hands-on exercises with inference control
and database privacy
Documentary: “No More Privacy, All About
You”
Database privacy in the headlines
Day 3: RFID and Surveillance
Readings on RFID, video surveillance, and
REAL-ID
Hands-on exercises with RFID experiment
kits
RFID and surveillance in the headlines
Documentary: “Hacking Democracy”
(preparation for Day 4)
Day 4: Electronic Voting
Readings on electronic voting
Hands-on exercises with Python
programming
Hands-on exercise reading source code for
electronic voting system and running mock
election
Electronic voting in the headlines
Day 5: CS Careers, Lesson
Planning and Tools
Exploration of on-line Occupational
Outlook Handbook
Hands-on exercises with CyberCivics tools
and “kits” (virtual machines, LiveCDs)
Lesson planning activity and feedback
Kits
Materials budget to provision “kits” that teachers
can check out and use
Kits will include
CDs with virtual machine images and LiveCDs
Collections of readings (loose leaf for ease of copying)
Hardware such as wireless access points and RFID kits
Copies of relevant DVDs and books
On-line “kit” supplements will contain downloadable
files, pointers to on-line resources including where
to buy materials, etc.
-39