Information Privacy with Applications (Fall 2018): Difference between revisions

From Sidiprojects Wiki
Jump to navigation Jump to search
(→‎Lectures: added threat modeling slides)
(→‎Class Sessions: added Ken Thompson on trusting trust; security assessment of SecureDrop)
Line 63: Line 63:
* Lecture 7: Ethics I  
* Lecture 7: Ethics I  
* Lecture 8: Ethics II (guest)
* Lecture 8: Ethics II (guest)
* [[:File:Slides_threat_modeling_I.pdf|Lecture 9: Privacy and Trust, Threat modeling I]]
* [[:File:Slides_threat_modeling_II.pdf|Lecture 10: Privacy and Trust, Threat modeling II]]
====Readings not linked in the syllabus====
====Readings not linked in the syllabus====
* [https://ebookcentral.proquest.com/lib/uaz/reader.action?docID=416053&ppg=166 Hursthouse, 'Environmental Ethics']
* [https://ebookcentral.proquest.com/lib/uaz/reader.action?docID=416053&ppg=166 Hursthouse, 'Environmental Ethics']
Line 73: Line 70:
* [[:File:DoesGovernmentSurveillanceGiveTwittertheChills_Long.docx|Brandimarte, ''Does Government Surveillance Give Twitter the Chills?'' (excerpt)]]
* [[:File:DoesGovernmentSurveillanceGiveTwittertheChills_Long.docx|Brandimarte, ''Does Government Surveillance Give Twitter the Chills?'' (excerpt)]]
* [[:File:Greenwald_excerpt.pdf|Greenwald, ''No Place to Hide'' (excerpt)]]
* [[:File:Greenwald_excerpt.pdf|Greenwald, ''No Place to Hide'' (excerpt)]]
===Trust and Privacy===
====Lectures====
* [[:File:Slides_threat_modeling_I.pdf|Lecture 9: Privacy and Trust, Threat modeling I]]
* [[:File:Slides_threat_modeling_II.pdf|Lecture 10: Privacy and Trust, Threat modeling II]]
====Readings not linked in the syllabus====
* [[:File:Thompson_reflections_on_trusting_trust.pdf|Thompson, 'Reflections on Trusting Trust']]
* [[:File:DeadDropStrongBox_Security_Assessment.pdf|Czeskis et al., 'DeadDrop/StrongBox Security Assessment']]


== Other things mentioned in class ==
== Other things mentioned in class ==

Revision as of 00:25, 2 October 2018

Quick Information

Instructor: David Sidi
Office Location: HARV 456 / HARV 454
Office Hours: Fridays at 10:30 AM
Telephone: (520) 621-5703
Email: dsidi@email.arizona.edu
PGP Fingerprint: 9FB6 167B D4BD 44FE 90F7 51D0 87B6 0D65 3A14 517D
Home page: https://u.arizona.edu/~dsidi/
Live question tool: https://sidiprojects.us/live_questions
Grades: https://d2l.arizona.edu/


More information is in the syllabus

Assignments

Write-ups

There is a write-up due before class on any day in which we have a visiting speaker.

Writing assignments

Assignment 0: Quick exercises in the shell

There is no deadline for this assignment, as it will not be turned in for a grade, but you should try to get it done in the next day or two.

Assignment 0 - A few quick exercises in the shell, to get used to things.

Assignment 1: Permissions

Due Tuesday, 28 August 2018, by 11:59 PM (MST).

Assignment 1: Permissions challenge

Assignment 2: Watchfulness

Due Tuesday, 18 September 2018, by 11:59 PM (MST).

Assignment 2: Watchfulness

Assignment 3: Threat Modeling

Due Tuesday, 02 October 2018, by 11:59 PM (MST).

Assignment 3: Threat Modeling

Class Sessions

Why care about privacy?

Lectures

Readings not linked in the syllabus

Trust and Privacy

Lectures

Readings not linked in the syllabus

Other things mentioned in class