Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Lecture 7: CSCI E-1 Spring 2013
Search
Tommy MacWilliam
April 10, 2013
Education
0
520
Lecture 7: CSCI E-1 Spring 2013
Tommy MacWilliam
April 10, 2013
Tweet
Share
More Decks by Tommy MacWilliam
See All by Tommy MacWilliam
Lecture 9: CSCI E-1 Spring 2013
tmacwill
0
310
Lecture 8: CSCI E-1 Spring 2013
tmacwill
0
440
Lecture 6: CSCI E-1 Spring 2013
tmacwill
1
450
Lecture 5: CSCI E-1 Spring 2013
tmacwill
1
600
Incorporating Version Control into Programming Courses
tmacwill
1
110
Lecture 4: CSCI E-1 Spring 2013
tmacwill
0
410
Lecture 3: CSCI E-1 Spring 2013
tmacwill
0
490
Lecture 2: CSCI E-1 Spring 2013
tmacwill
0
790
Lecture 1: CSCI E-1 Spring 2013
tmacwill
0
320
Other Decks in Education
See All in Education
オンラインゆっくり相談室ってなに?
ytapples613
PRO
0
150
Initiatives on Bridging the Gender Gap in the Technology Sector
codeforeveryone
0
120
Sanapilvet opetuksessa
matleenalaakso
0
31k
Padlet opetuksessa
matleenalaakso
4
13k
Казармы и гарнизоны
pnuslide
0
170
ISMS審査準備ブック_サンプル【LRM 情報セキュリティお役立ち資料】
lrm
0
1.1k
1127
cbtlibrary
0
180
Adobe Express
matleenalaakso
1
7.7k
Web からのデータ収集と探究事例の紹介 / no94_jsai_seminar
upura
0
110
JAWS-UGを通じてアウトプット活動を楽しんでみませんか? #jawsug_tochigi
masakiokuda
0
210
Tips for the Presentation - Lecture 2 - Advanced Topics in Big Data (4023256FNR)
signer
PRO
0
200
小学校プログラミング教育、次の5年に向けて 〜つくること・学ぶことの歓びへ〜 /NextGenerationOfProgrammingEducation
kiriem
2
360
Featured
See All Featured
Learning to Love Humans: Emotional Interface Design
aarron
273
40k
Bootstrapping a Software Product
garrettdimon
PRO
306
110k
Designing for humans not robots
tammielis
250
25k
YesSQL, Process and Tooling at Scale
rocio
172
14k
Helping Users Find Their Own Way: Creating Modern Search Experiences
danielanewman
29
2.4k
The Straight Up "How To Draw Better" Workshop
denniskardys
232
140k
Git: the NoSQL Database
bkeepers
PRO
427
64k
How To Stay Up To Date on Web Technology
chriscoyier
790
250k
Navigating Team Friction
lara
183
15k
The Illustrated Children's Guide to Kubernetes
chrisshort
48
49k
JavaScript: Past, Present, and Future - NDC Porto 2020
reverentgeek
47
5.2k
Improving Core Web Vitals using Speculation Rules API
sergeychernyshev
9
440
Transcript
Computer Science E-1 Lecture 7: Privacy and Design
Malware
Viruses
Melissa Virus
Worms
Botnets
DDoS
Conficker
ILOVEYOU
Spyware
Keyloggers
Trojan Horses
Adware
Anti-Malware
Passwords
Dictionary Attack
Password Safes
Hashing Passwords
MD5, SHA-1
Deleting Files
DBAN
Disk Encryption
Cold Boot Attack
None
http://youtu.be/JDaicPIgn9U
Authentication
None
OpenID
None
Authorization
OAuth
None
Cookies
None
None
http://arstechnica.com/business/ 2013/02/firefox-22-will-block-third- party-cookies/
Logs
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908
"-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
User Agent
157.166.226.25 - - [31/Mar/2013:03:39:47 +0000] "GET /cats HTTP/1.1" 200 37813
"-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/ 26.0.1410.43 Safari/537.31"
Netscape, Mosaic
WebKit, KHTML, Gecko
http://webaim.org/blog/user-agent- string-history/
Analytics
None
A/B Testing
Protecting Privacy
Proxy Server
None
Switching User Agents
None
TrueCrypt
GPG
None
Hacking
“To programmers, "hacker" connotes mastery in the most literal sense:
someone who can make a computer do what he wants —whether the computer wants to or not.”
Cracking
DMCA
Copyright
DRM
Design
CRAP
Contrast Repetition Alignment Proximity
Contrast
None
None
Repetition
None
Alignment
None
None
Proximity
None
None
Usability
Visibility of system status
None
Match between system and real world
None
User control and freedom
None
Consistency and standards
None
Error prevention
None
Recognition rather than recall
None
Flexibility and efficiency of use
None
Aesthetic and minimalist design
None
Help users recognize, diagnose, and recover from errors
None
Help and documentation
Typography
None
None
None
None
Leading
Tracking
Kerning
Design Critiques
None
None
None
None
None
None
None
None
None
None
Computer Science E-1 Lecture 7: Privacy and Design