Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Lecture 7: CSCI E-1 Spring 2013

Lecture 7: CSCI E-1 Spring 2013

Tommy MacWilliam

April 10, 2013
Tweet

More Decks by Tommy MacWilliam

Other Decks in Education

Transcript

  1. Computer Science E-1
    Lecture 7: Privacy and Design

    View Slide

  2. Malware

    View Slide

  3. Viruses

    View Slide

  4. Melissa Virus

    View Slide

  5. Worms

    View Slide

  6. Botnets

    View Slide

  7. DDoS

    View Slide

  8. Conficker

    View Slide

  9. ILOVEYOU

    View Slide

  10. Spyware

    View Slide

  11. Keyloggers

    View Slide

  12. Trojan Horses

    View Slide

  13. Adware

    View Slide

  14. Anti-Malware

    View Slide

  15. Passwords

    View Slide

  16. Dictionary Attack

    View Slide

  17. Password Safes

    View Slide

  18. Hashing Passwords

    View Slide

  19. MD5, SHA-1

    View Slide

  20. Deleting Files

    View Slide

  21. DBAN

    View Slide

  22. Disk Encryption

    View Slide

  23. Cold Boot Attack

    View Slide

  24. View Slide

  25. http://youtu.be/JDaicPIgn9U

    View Slide

  26. Authentication

    View Slide

  27. View Slide

  28. OpenID

    View Slide

  29. View Slide

  30. Authorization

    View Slide

  31. OAuth

    View Slide

  32. View Slide

  33. Cookies

    View Slide

  34. View Slide

  35. View Slide

  36. http://arstechnica.com/business/
    2013/02/firefox-22-will-block-third-
    party-cookies/

    View Slide

  37. Logs

    View Slide

  38. 173.194.43.14 - - [31/Mar/2013:03:39:26
    +0000] "GET / HTTP/1.1" 200 12908 "-"
    "Mozilla/5.0 (Windows NT 6.1;
    WOW64) AppleWebKit/534.57.2
    (KHTML, like Gecko) Version/5.1.7
    Safari/534.57.2"

    View Slide

  39. 173.194.43.14 - - [31/Mar/2013:03:39:26
    +0000] "GET / HTTP/1.1" 200 12908 "-"
    "Mozilla/5.0 (Windows NT 6.1;
    WOW64) AppleWebKit/534.57.2
    (KHTML, like Gecko) Version/5.1.7
    Safari/534.57.2"

    View Slide

  40. 173.194.43.14 - - [31/Mar/2013:03:39:26
    +0000] "GET / HTTP/1.1" 200 12908 "-"
    "Mozilla/5.0 (Windows NT 6.1;
    WOW64) AppleWebKit/534.57.2
    (KHTML, like Gecko) Version/5.1.7
    Safari/534.57.2"

    View Slide

  41. 173.194.43.14 - - [31/Mar/2013:03:39:26
    +0000] "GET / HTTP/1.1" 200 12908 "-"
    "Mozilla/5.0 (Windows NT 6.1;
    WOW64) AppleWebKit/534.57.2
    (KHTML, like Gecko) Version/5.1.7
    Safari/534.57.2"

    View Slide

  42. 173.194.43.14 - - [31/Mar/2013:03:39:26
    +0000] "GET / HTTP/1.1" 200 12908 "-"
    "Mozilla/5.0 (Windows NT 6.1;
    WOW64) AppleWebKit/534.57.2
    (KHTML, like Gecko) Version/5.1.7
    Safari/534.57.2"

    View Slide

  43. User Agent

    View Slide

  44. 157.166.226.25 - - [31/Mar/2013:03:39:47
    +0000] "GET /cats HTTP/1.1" 200 37813
    "-" "Mozilla/5.0 (Macintosh; Intel Mac OS
    X 10_8_3) AppleWebKit/537.31
    (KHTML, like Gecko) Chrome/
    26.0.1410.43 Safari/537.31"

    View Slide

  45. Netscape, Mosaic

    View Slide

  46. WebKit, KHTML, Gecko

    View Slide

  47. http://webaim.org/blog/user-agent-
    string-history/

    View Slide

  48. Analytics

    View Slide

  49. View Slide

  50. A/B Testing

    View Slide

  51. Protecting Privacy

    View Slide

  52. Proxy Server

    View Slide

  53. View Slide

  54. Switching User Agents

    View Slide

  55. View Slide

  56. TrueCrypt

    View Slide

  57. GPG

    View Slide

  58. View Slide

  59. Hacking

    View Slide

  60. “To programmers, "hacker" connotes
    mastery in the most literal sense: someone
    who can make a computer do what he wants
    —whether the computer wants to or not.”

    View Slide

  61. Cracking

    View Slide

  62. DMCA

    View Slide

  63. Copyright

    View Slide

  64. DRM

    View Slide

  65. Design

    View Slide

  66. CRAP

    View Slide

  67. Contrast
    Repetition
    Alignment
    Proximity

    View Slide

  68. Contrast

    View Slide

  69. View Slide

  70. View Slide

  71. Repetition

    View Slide

  72. View Slide

  73. Alignment

    View Slide

  74. View Slide

  75. View Slide

  76. Proximity

    View Slide

  77. View Slide

  78. View Slide

  79. Usability

    View Slide

  80. Visibility of system status

    View Slide

  81. View Slide

  82. Match between system
    and real world

    View Slide

  83. View Slide

  84. User control and freedom

    View Slide

  85. View Slide

  86. Consistency and standards

    View Slide

  87. View Slide

  88. Error prevention

    View Slide

  89. View Slide

  90. Recognition rather than recall

    View Slide

  91. View Slide

  92. Flexibility and efficiency of use

    View Slide

  93. View Slide

  94. Aesthetic and minimalist design

    View Slide

  95. View Slide

  96. Help users recognize, diagnose, and
    recover from errors

    View Slide

  97. View Slide

  98. Help and documentation

    View Slide

  99. Typography

    View Slide

  100. View Slide

  101. View Slide

  102. View Slide

  103. View Slide

  104. Leading

    View Slide

  105. Tracking

    View Slide

  106. Kerning

    View Slide

  107. Design Critiques

    View Slide

  108. View Slide

  109. View Slide

  110. View Slide

  111. View Slide

  112. View Slide

  113. View Slide

  114. View Slide

  115. View Slide

  116. View Slide

  117. View Slide

  118. Computer Science E-1
    Lecture 7: Privacy and Design

    View Slide