Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Lecture 7: CSCI E-1 Spring 2013

Lecture 7: CSCI E-1 Spring 2013

Tommy MacWilliam

April 10, 2013
Tweet

More Decks by Tommy MacWilliam

Other Decks in Education

Transcript

  1. Computer Science E-1
    Lecture 7: Privacy and Design

    View full-size slide

  2. Melissa Virus

    View full-size slide

  3. Trojan Horses

    View full-size slide

  4. Anti-Malware

    View full-size slide

  5. Dictionary Attack

    View full-size slide

  6. Password Safes

    View full-size slide

  7. Hashing Passwords

    View full-size slide

  8. Deleting Files

    View full-size slide

  9. Disk Encryption

    View full-size slide

  10. Cold Boot Attack

    View full-size slide

  11. http://youtu.be/JDaicPIgn9U

    View full-size slide

  12. Authentication

    View full-size slide

  13. Authorization

    View full-size slide

  14. http://arstechnica.com/business/
    2013/02/firefox-22-will-block-third-
    party-cookies/

    View full-size slide

  15. 173.194.43.14 - - [31/Mar/2013:03:39:26
    +0000] "GET / HTTP/1.1" 200 12908 "-"
    "Mozilla/5.0 (Windows NT 6.1;
    WOW64) AppleWebKit/534.57.2
    (KHTML, like Gecko) Version/5.1.7
    Safari/534.57.2"

    View full-size slide

  16. 173.194.43.14 - - [31/Mar/2013:03:39:26
    +0000] "GET / HTTP/1.1" 200 12908 "-"
    "Mozilla/5.0 (Windows NT 6.1;
    WOW64) AppleWebKit/534.57.2
    (KHTML, like Gecko) Version/5.1.7
    Safari/534.57.2"

    View full-size slide

  17. 173.194.43.14 - - [31/Mar/2013:03:39:26
    +0000] "GET / HTTP/1.1" 200 12908 "-"
    "Mozilla/5.0 (Windows NT 6.1;
    WOW64) AppleWebKit/534.57.2
    (KHTML, like Gecko) Version/5.1.7
    Safari/534.57.2"

    View full-size slide

  18. 173.194.43.14 - - [31/Mar/2013:03:39:26
    +0000] "GET / HTTP/1.1" 200 12908 "-"
    "Mozilla/5.0 (Windows NT 6.1;
    WOW64) AppleWebKit/534.57.2
    (KHTML, like Gecko) Version/5.1.7
    Safari/534.57.2"

    View full-size slide

  19. 173.194.43.14 - - [31/Mar/2013:03:39:26
    +0000] "GET / HTTP/1.1" 200 12908 "-"
    "Mozilla/5.0 (Windows NT 6.1;
    WOW64) AppleWebKit/534.57.2
    (KHTML, like Gecko) Version/5.1.7
    Safari/534.57.2"

    View full-size slide

  20. 157.166.226.25 - - [31/Mar/2013:03:39:47
    +0000] "GET /cats HTTP/1.1" 200 37813
    "-" "Mozilla/5.0 (Macintosh; Intel Mac OS
    X 10_8_3) AppleWebKit/537.31
    (KHTML, like Gecko) Chrome/
    26.0.1410.43 Safari/537.31"

    View full-size slide

  21. Netscape, Mosaic

    View full-size slide

  22. WebKit, KHTML, Gecko

    View full-size slide

  23. http://webaim.org/blog/user-agent-
    string-history/

    View full-size slide

  24. Protecting Privacy

    View full-size slide

  25. Proxy Server

    View full-size slide

  26. Switching User Agents

    View full-size slide

  27. “To programmers, "hacker" connotes
    mastery in the most literal sense: someone
    who can make a computer do what he wants
    —whether the computer wants to or not.”

    View full-size slide

  28. Contrast
    Repetition
    Alignment
    Proximity

    View full-size slide

  29. Visibility of system status

    View full-size slide

  30. Match between system
    and real world

    View full-size slide

  31. User control and freedom

    View full-size slide

  32. Consistency and standards

    View full-size slide

  33. Error prevention

    View full-size slide

  34. Recognition rather than recall

    View full-size slide

  35. Flexibility and efficiency of use

    View full-size slide

  36. Aesthetic and minimalist design

    View full-size slide

  37. Help users recognize, diagnose, and
    recover from errors

    View full-size slide

  38. Help and documentation

    View full-size slide

  39. Design Critiques

    View full-size slide

  40. Computer Science E-1
    Lecture 7: Privacy and Design

    View full-size slide