Security, Privacy and Ethics

5/19/00


Click here to start


Table of Contents

Security, Privacy and Ethics

Viruses

Types

Types (cont.)

Bombs and worms

Protection

Unauthorized access and use

Protection against unauthorized access

More on passwords

Other examples

Cryptography

Keys

Digital signature

Encryption controversy

Gone but not forgotten

YOU’RE NOT PARANOID

Data mining

Your Privacy Quotient

Privacy Quotient (cont.)

At work

The Cookie Monster

Software Piracy

More

References

Author: Tom Blum

Email: blum@lasalle.edu

Home Page: www.lasalle.edu/~blum