Lecture 7: CSCI E-1 Spring 2013

Lecture 7: CSCI E-1 Spring 2013

9e4d3e53f8525fdff00691a8b843e66b?s=128

Tommy MacWilliam

April 10, 2013
Tweet

Transcript

  1. Computer Science E-1 Lecture 7: Privacy and Design

  2. Malware

  3. Viruses

  4. Melissa Virus

  5. Worms

  6. Botnets

  7. DDoS

  8. Conficker

  9. ILOVEYOU

  10. Spyware

  11. Keyloggers

  12. Trojan Horses

  13. Adware

  14. Anti-Malware

  15. Passwords

  16. Dictionary Attack

  17. Password Safes

  18. Hashing Passwords

  19. MD5, SHA-1

  20. Deleting Files

  21. DBAN

  22. Disk Encryption

  23. Cold Boot Attack

  24. None
  25. http://youtu.be/JDaicPIgn9U

  26. Authentication

  27. None
  28. OpenID

  29. None
  30. Authorization

  31. OAuth

  32. None
  33. Cookies

  34. None
  35. None
  36. http://arstechnica.com/business/ 2013/02/firefox-22-will-block-third- party-cookies/

  37. Logs

  38. 173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908

    "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
  39. 173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908

    "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
  40. 173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908

    "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
  41. 173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908

    "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
  42. 173.194.43.14 - - [31/Mar/2013:03:39:26 +0000] "GET / HTTP/1.1" 200 12908

    "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534.57.2 (KHTML, like Gecko) Version/5.1.7 Safari/534.57.2"
  43. User Agent

  44. 157.166.226.25 - - [31/Mar/2013:03:39:47 +0000] "GET /cats HTTP/1.1" 200 37813

    "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/ 26.0.1410.43 Safari/537.31"
  45. Netscape, Mosaic

  46. WebKit, KHTML, Gecko

  47. http://webaim.org/blog/user-agent- string-history/

  48. Analytics

  49. None
  50. A/B Testing

  51. Protecting Privacy

  52. Proxy Server

  53. None
  54. Switching User Agents

  55. None
  56. TrueCrypt

  57. GPG

  58. None
  59. Hacking

  60. “To programmers, "hacker" connotes mastery in the most literal sense:

    someone who can make a computer do what he wants —whether the computer wants to or not.”
  61. Cracking

  62. DMCA

  63. Copyright

  64. DRM

  65. Design

  66. CRAP

  67. Contrast Repetition Alignment Proximity

  68. Contrast

  69. None
  70. None
  71. Repetition

  72. None
  73. Alignment

  74. None
  75. None
  76. Proximity

  77. None
  78. None
  79. Usability

  80. Visibility of system status

  81. None
  82. Match between system and real world

  83. None
  84. User control and freedom

  85. None
  86. Consistency and standards

  87. None
  88. Error prevention

  89. None
  90. Recognition rather than recall

  91. None
  92. Flexibility and efficiency of use

  93. None
  94. Aesthetic and minimalist design

  95. None
  96. Help users recognize, diagnose, and recover from errors

  97. None
  98. Help and documentation

  99. Typography

  100. None
  101. None
  102. None
  103. None
  104. Leading

  105. Tracking

  106. Kerning

  107. Design Critiques

  108. None
  109. None
  110. None
  111. None
  112. None
  113. None
  114. None
  115. None
  116. None
  117. None
  118. Computer Science E-1 Lecture 7: Privacy and Design