Security, Privacy and Ethics
Viruses
Types
Types (cont.)
Bombs and worms
Protection
Unauthorized access and use
Protection against unauthorized access
More on passwords
Other examples
Cryptography
Keys
Digital signature
Encryption controversy
Gone but not forgotten
YOU’RE NOT PARANOID
Data mining
Your Privacy Quotient
Privacy Quotient (cont.)
At work
The Cookie Monster
Software Piracy
More
References
Email: blum@lasalle.edu
Home Page: www.lasalle.edu/~blum