Top Banner
Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama
24

Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Ethics and Computer Security

Phillip G. BradfordComputer Science

University of Alabama

Page 2: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Outline Ethics Data, Computers, and Networks

Ciphers in War & Peace Caesar Turing ITAR --- Computer Security as `military weapons’

Very `Strong’ Computer Security Has the Game Changed?

Economic Applications Human Rights Applications

Page 3: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Objectives Philosophical and Historical Perspective

Understanding the Foundations Keeping Data Secure

Why keep computers secure? `Bad’ People using Computer Security

Who’s side am I on, anyway? It is not all about War!

Examples from Humanistic Applications

Page 4: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Ethics

Rules, standards, principles: Govern `right’ conduct

Who is to say what is `right’ ? What information about you is on

Computer? What standards do you expect?

Privacy Rights In Different Countries

Page 5: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Ethics

Free, Capitalist Societies and Ethics Freedom of speech, association, … Freedom of the press

Must be able to demonstrate `some truth’ Technology has been an enabler here!

Printing Press TV, Radio The Internet!

Page 6: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Sword and Plow-share

All technology is a double-edge sword Applications can be good or bad

Almost every Technological Advance Is intended to do Good Unfortunately, high ethical standards are

not universal Further, what is ethical can be subjective

Page 7: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Sword and Plow-share

Albert Einstein: “Concern for man himself must

always constitute the chief objective of all technological effort”

So that: “the results of our scientific thinking may be a blessing to mankind, and not a curse”

Page 8: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Algorithms and Secret Codes Julius Caesar

Credited with the Caesar cipher Encryption Algorithm

“2001” by Kubrick Computer named HAL

Shift-by-one: H I A B L M

Page 9: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Computers and Secret Codes

Alan M. Turing Famous Mathematician/Computer

Scientist Computer Science’s Turing Award

Team Cracked the “Nazi Enigma” Helped Allies Win the War

Used electro-mechanical computers Towards general Universal stored

program computer

Page 10: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Much Stronger Ciphers Today

1970s “Bad News” in Computer Science: Some classes of problems seem very

hard to solve! 1970s-1980s: Reframe “Bad News”

to “Good News” for Computer Security! Use seemingly very hard problems to

hide secrets!

Page 11: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

An Example `Hard’ Problem

Towers of Hanoi Start Configuration

A B C

Page 12: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

An Example `Hard’ Problem

Rules Move Only One Disk at a Time! Smaller Disks Must Be on Top!

Final Configuration Desired:

A B C

Page 13: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

An Example `Hard’ Problem What `Algorithm’ Can We Use?

A B C

A B C

A B C

Page 14: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

An Example `Hard’ Problem

More of the `algorithm’

A B C

A B C

A B C

Page 15: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

An Example `Hard’ Problem

Finally:

A B C

Page 16: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

An Example `Hard’ Problem

What about 4 Disks?

A B C

A B C

How Much MORE work than for 3 Disks?

Page 17: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

The ITAR Controversy ITAR & Related Laws

International Traffic in Arms Regulations Good Intent to Restrict Export

Restrict Strong Ciphers to the US, Canada & Allies

Bad Economic Consequences Put US software sales at a disadvantage

Other Consequences?

Page 18: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Computers in Society

How do Human Rights Groups use Computer Security? Justice Brandeis:

"Sunlight is the best disinfectant."

Getting detailed information Out Using Laptops and Cellular Videotape

Page 19: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Computers in Society

What does Encryption Do Here? Hide the data (testimony) from Rights

Violators Until it is safely stored Hide the identities of those whom

testify Hide the Enablers helping people fight

for Human Rights Allow Secret Transmission of Data

Page 20: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Computers in Society

Documenting Human Rights Abuses Gain Understanding of Scale, types, … Present detailed facts to United

Nations, … Prepare for intervention De-motivate Rights Abusers

Presents the possibility of the real history existing!

Page 21: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Computers in Society

The International Center for Human Rights Research and partners 5,000 Human Rights Violation

Testimonies Between 1994 and 1995

No paper trail Easy analysis of data Extremely strong Ciphers!

Page 22: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Computers in Society Unfortunate data to gather

Does not diminish its importance Forensic Analysis of Data

Very sensitive data Time sensitive, need speed Storing, understanding and analyzing

data Successful long-term Intervention

requires (deep) Understanding

Page 23: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Computers in Society Haiti between 1993 and 1994

Political Murders Peak At Certain Times Document and Chronicle

High Coordination of Political Terror Must be Government Sponsored Police and underground criminals

coordinated Likely explanation:

Terrorize people and aid workers to reject calls for US intervention

Page 24: Ethics and Computer Security Phillip G. Bradford Computer Science University of Alabama.

Conclusions Computers & Information About us

Need Computer Security! Many Ethical Issues Arise with Computer

Security Good and Bad Uses

Many `Hard’ Ciphers Exist We can use Computer Security for

Many Good things Let’s Keep it that way!